SHA-2

Results: 893



#Item
531Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
532SHA-2 / MD5 / Error detection and correction / Cryptographic hash functions / SHA-1

Cryptographic Hash Workshop[removed]Message Modification, Neutral Bits and Boomerangs: From Which Round Should we Start Counting in SHA?"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:22:30
533PKCS / FIPS 140-2 / FIPS 140 / Key Wrap / SHA-2 / HMAC / Advanced Encryption Standard / Cryptographic Module Validation Program / SHA-1 / Cryptography / Cryptography standards / Network Security Services

Microsoft Word - Security_ Policy_Wind_River_NSS_0801.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
534Data Encryption Standard / SHA-1 / FIPS 140-2 / FIPS 140 / HMAC / RC5 / DES-X / Block cipher / Crypto++ / Cryptography / Cryptographic software / Cryptography standards

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
535Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
536Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
537Collision attack / SHA-2 / MD5 / Hash function / MD4 / RSA / Provably secure cryptographic hash function / One-way compression function / Cryptography / Cryptographic hash functions / SHA-1

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
538Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
539Cryptographic protocols / Internet protocols / Internet standards / SHA-2 / SHA-1 / Online Certificate Status Protocol / Cambridge Rindge and Latin School / Cryptography / Cryptographic hash functions / Public-key cryptography

Shared Service Providers Com m on Policy, Certificate and CRL Profile, and Repository Profile David Cooper and Nelson Hastings January 14, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
540Computer security / HMAC / Hashing / FIPS 140-2 / FIPS 140 / SHA-2 / Authentication / Cryptography / Cryptography standards / Security

FIPS[removed]Level 2 Security Policy For SAMSUNG SSD PM810 SED FIPS 140 Module Document Version 0.6

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-11 17:46:18
UPDATE