SHA-2

Results: 893



#Item
621NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
622NIST hash function competition / Hashing / Vlastimil Klíma / Preimage attack / Crypt / Hash function / CubeHash / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:14:28
623Computer architecture / Advanced Encryption Standard / SHA-1 / SHA-2 / Cell / SIMD / Crypt / MD5 / Central processing unit / Cryptographic hash functions / Computing / Cryptography

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2010-10-29 15:38:04
624SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-06-27 13:16:19
625Random number generation / SHA-2 / Cryptographic hash function / Digital Signature Algorithm / Hash function / Octet / Random password generator / Cryptography / Randomness / Pseudorandom number generators

FIPS[removed]Change Notice[removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 12:26:58
626Cryptographic hash functions / Keccak / BLAKE / Advanced Encryption Standard / Crypt / Skein / Algorithm / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

outbind://132-00000000C28D6AD45D681F4D837CF97C3377EF1B070066930

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-16 14:39:14
627Cryptographic hash functions / SHA-2

PDF Document

Add to Reading List

Source URL: bofdata.fire.ca.gov

Language: English - Date: 1997-07-26 01:00:00
628Computing / Search algorithms / Mathematics / Numbers / Error detection and correction / Hash function / Floating point / SHA-2 / Rounding / Hashing / Cryptographic hash functions / Computer arithmetic

A Fingerprint Method for Scientific Data Verification1 Version: [removed]Micah Altman Institute for Quantitative Social Science, Harvard University 1737 Cambridge St. # 325

Add to Reading List

Source URL: thedata.org

Language: English - Date: 2013-01-06 22:42:48
629Computing / Hashing / MD5 / Suppression list / Search algorithms / Crypt / SHA-1 / SHA-2 / Hash function / Cryptographic hash functions / Cryptography / Email

Microsoft Word - MD5 Suppression List Encryption final[removed]doc

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2009-04-22 18:33:13
630Cryptographic protocols / Electronic commerce / Digital signature / Cryptographic hash function / Public key certificate / X.509 / Elliptic Curve DSA / SHA-2 / Cryptlib / Cryptography / Public-key cryptography / Key management

Integration of Digital Signatures into the Existing Object Memory Model (OMM) - Concept Paper Sascha Groß, S¨onke Knoch, Jens Haupert German Research Center for Artificial Intelligence (DFKI) Saarbr¨ ucken, Germany

Add to Reading List

Source URL: www.dfki.de

Language: English - Date: 2014-01-28 05:11:28
UPDATE