SHA-2

Results: 893



#Item
581Cryptographic hash functions / Key management / Time / Code signing / Public key certificate / Timestamp / SHA-2 / SHA-1 / PKCS / Cryptography / Public-key cryptography / Electronic commerce

Entrust Certificate Services Authenticode Signing User Guide

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-06-13 14:10:10
582Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
583Error detection and correction / Search algorithms / Hash function / Hash tree / Hash list / SHA-1 / SHA-2 / Trie / Hash chain / Cryptographic hash functions / Cryptography / Hashing

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
584DigiCert / Extended Validation Certificate / X.509 / Public key certificate / Certificate authority / Phishing / Public key infrastructure / SHA-2 / Cryptography / Key management / Public-key cryptography

1 January[removed]This Issue

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:35
585Electronic commerce / Certificate authorities / DigiCert / Secure communication / Extended Validation Certificate / X.509 / CA/Browser Forum / Public key certificate / SHA-2 / Cryptography / Key management / Public-key cryptography

11 November 2010 This Issue SHA-2 P.1

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:35
586Public-key cryptography / Key size / Ciphertext / Key / Symmetric-key algorithm / Crypt / Cipher / Data Encryption Standard / SHA-2 / Cryptography / Key management / Cryptographic hash functions

Microsoft PowerPoint - 2013_KYCOT_SecurityMonth_UsingEncryption.pptx

Add to Reading List

Source URL: technology.ky.gov

Language: English - Date: 2013-11-05 08:59:32
587Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / IOS / IPhone / IPad / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / Computing

PDF Document

Add to Reading List

Source URL: km.support.apple.com

Language: English - Date: 2013-11-08 14:13:50
588Finite fields / Elliptic curve cryptography / Elliptic curve / Curve / NSA Suite B Cryptography / NIST hash function competition / SHA-2 / Elliptic Curve DSA / Cryptography / Cryptographic hash functions / Mathematics

How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein1,2 , Tung Chou1 , Chitchanok Chuengsatiansup1 , Andreas H¨ ulsing1 , 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 00:04:01
589Error detection and correction / HTTP clients / Hashing / Hash list / SHA-1 / Wget / CURL / Hash function / Metalink / Software / Computing / Cryptographic hash functions

Package ‘downloader’ July 2, 2014 Maintainer Winston Chang Author Winston Chang Version 0.3 License GPL-2

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:40:07
590Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
UPDATE