SHA-2

Results: 893



#Item
721Cryptographic Module Validation Program / Elliptic curve cryptography / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key size / SHA-1 / Digital signature / Crypt / Cryptography / Cryptography standards / FIPS 140-2

The Cryptographic Algorithm Validation Program

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:47
722Message authentication codes / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / FIPS 140 / Key size / Cryptographic Module Validation Program / SHA-1 / HMAC / Cryptography / Cryptography standards / Error detection and correction

RSA BSAFE® Crypto-C Micro Edition[removed]FIPS[removed]Validation Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
723United Nations Economic and Social Council / Sha Zukang / United Nations Department of Economic and Social Affairs / Juan Somavía / Foreign minister / Jan Eliasson / Ministry of Foreign Affairs / United Nations / United Nations Secretariat / Development

9 July[removed]High-level Segment New York, 2 – 9 July Programme Monday, 2 July

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2012-07-09 14:43:24
724Hash function / SHA-1 / BibTeX / Computing / Artificial intelligence / Information science / Cryptographic hash functions / Search algorithms / Error detection and correction

Package ‘repmis’ July 2, 2014 Type Package Title A collection of miscellaneous tools for reproducible research with R. Description The package includes tools to load R packages and automatically generate BibTeX files

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:16:53
725Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
726Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
727SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
728Appeal / Appellate review / Legal procedure / Motion / Court system of Canada / Law / Court systems / Lawsuits

SCHEDULE 4 (Subsection[removed]APPEAL BOOK 1. Any appeal book shall be prepared on white paper of good quality in such manner that printed pages are to the left as the book is read. 2. The ty pe used in an app eal book sha

Add to Reading List

Source URL: www.cmac-cacm.ca

Language: English - Date: 2014-03-30 09:54:27
729Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
730Computing / Seagate Technology / Heat-assisted magnetic recording / SHA-2

HDD-based Security SMR Recorded HDDs Dave Anderson, Seagate Technology Why Security in the HDD 3 Simple reasons

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2011-09-30 16:09:34
UPDATE