SHA-2

Results: 893



#Item
541Hash function / MD5 / MD4 / N-Hash / Lattice problem / NIST hash function competition / Trie / SHA-2 / Collision resistance / Cryptographic hash functions / Cryptography / SHA-1

Cryptographic Hash Workshop[removed]LASH

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:04
542PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
543Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
544Cryptographic hash functions / Concrete / Highways / Road / SHA-2 / Asphalt concrete / Transport / Land transport / Road transport

CTC Financial Vote List 2.5 June 25, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-08-07 19:33:47
545Cryptographic software / Cryptography standards / Computer security / Internet protocols / FIPS 140-2 / Internet Key Exchange / FIPS 140 / IPsec / SHA-2 / Cryptography / Cryptographic protocols / Computing

Redhat_OpenswanSecurity_Policyv1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-13 15:15:54
546One-way compression function / Collision resistance / Quasigroup / Hash function / SHA-2 / SHA-1 / Collision attack / Collision / MD5 / Cryptographic hash functions / Cryptography / Preimage attack

Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:31:50
547Hashing / Hash function / Applied mathematics / Truncation / SHA-2 / Mathematics / Artificial intelligence / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Search algorithms

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
548Collision attack / SHA-1 / MD5 / Collision resistance / SHA-2 / Hash function / RIPEMD / Birthday attack / Collision / Cryptographic hash functions / Cryptography / MD4

A Proposal of a criterion for collision resistance of hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:25:02
549Cryptography standards / Hashing / Cryptographic hash functions / Advanced Encryption Standard / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Cryptographic software

Microsoft Word - 05a - Security_Policy_Model-Open SSL_HP-_Ver1 0r4_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
550Computer security / Cryptography standards / Microsoft CryptoAPI / FIPS 140-2 / Cryptographic Service Provider / FIPS 140 / SHA-1 / CryptGenRandom / Crypto++ / Cryptography / Cryptographic software / Computing

Microsoft Word - 01o - TC-SecPol-27.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE