SHA-2

Results: 893



#Item
601Archaeological sub-disciplines / Science / Museology / Mark P. Leone / Anthropology / Archaeology / Cultural heritage

ANTHROPOLOGY 456 CRN[removed]Historical Archaeology SPRING 2010 TUESDAY AND THURSDAY 2:10 TO 3:30 PM, LA 302

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:19:26
602SHA-2 / Daniel J. Bernstein / Mathematics / Computing / NIST hash function competition / Cryptographic hash functions / CubeHash

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:40:14
603Feminist archaeology / Post-processual archaeology / Processual archaeology / Excavation / Community archaeology / Archaeology / Archaeological theory / Archaeological sub-disciplines

155 Studies in Early Medieval Coinage 2: New Perspectives Tony Abramson (editor) Boydell Press, Rochester, UK, 2011.

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-05-21 13:42:20
604NIST hash function competition / MD6 / Hashing / SHA-2 / Crypt / Ron Rivest / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:16:36
605SHA-2 / Hash function / Exclusive or / Grøstl / GOST / SHA-1 / Error detection and correction / Cryptographic hash functions / Cryptography

OFFICIAL COMMENT: Grostl 1 of 1 Subject: OFFICIAL COMMENT: Grostl From: "Søren S. Thomsen"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-30 01:00:00
606Cryptography / Hash function / Information retrieval / SHA-2 / NIST hash function competition / Collision / Artificial intelligence / Computing / Cryptographic hash functions / Hashing / Search algorithms

OFFICIAL COMMENT:DynamicSHA2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:41:26
607Anthropology / Archaeology

Contents Volume 42, No. 2  2008 J. C. Harrington Medal 2008: james edward ayres 1

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:16:56
608Hashing / Error detection and correction / SHA-2 / Debian / Electronic voting / Hash function / Software / Certification of voting machines / Digital signature / Cryptography / Cryptographic hash functions / Election technology

DRAFT Pre-Decisional Material March 2, 2005 DRAFT

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 15:20:14
609Hashing / BLAKE / Opteron / Advanced Micro Devices / MD6 / Computing / Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / SHA-2

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:11:44
610Premier Election Solutions / Politics / Computer network security / Technology / Diebold / SHA-1 / Computer security / SHA-2 / Electronic voting / Cryptographic hash functions / Security

Microsoft Word - TSxDuxFinalDec19.doc

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-03-20 14:27:05
UPDATE