SHA-2

Results: 893



#Item
761SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
762Cryptographic hash functions / Electronic commerce / SHA-1 / SHA-2 / Public key certificate / Public key infrastructure / Sha / Cryptography / Public-key cryptography / Key management

Status Update for DTrade PKI/SHA-256 Digital Certificate Upgrade Industry Notice: DTrade PKI/SHA-256 Digital Certificates DDTC is upgrading the DTrade system to ensure compliance with the use of Access Certificates for E

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-12 10:52:02
763Sha / Computing / Cryptographic hash functions / SHA-2 / SHA-1

Release Notes: DTrade v.3.0 November 22, 2013 Contents This document provides specific information for the release of DTrade v.3.0.

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-21 16:15:48
764Hashing / Computing / NIST hash function competition / Skein / Threefish / Hash tree / Hash function / B-tree / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

parSkein-tm-final_eprint.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-02 04:40:32
765Tonkin Street / Cheung Sha Wan / Hong Kong / Sham Shui Po

To: Rating and Valuation Department 15th Floor, Cheung Sha Wan Government Offices, 303 Cheung Sha Wan Road, Kowloon Attn: Assistant Technical Secretary (2) Fax No: [removed]

Add to Reading List

Source URL: www.rvd.gov.hk

Language: English - Date: 2014-05-31 12:02:44
766

ELEKTRONICKÉ PODÁNÍ VŮČI ŽIVNOSTENSKÉMU REJSTŘÍKU Podepisování elektronického podání – SHA-2

Add to Reading List

Source URL: www.businessinfo.cz

Language: Czech
    767

    ELEKTRONICKÉ PODÁNÍ VŮČI ŽIVNOSTENSKÉMU REJSTŘÍKU Podepisování elektronického podání – SHA-2

    Add to Reading List

    Source URL: www.rzp.cz

    Language: Czech - Date: 2011-08-15 04:24:48
      768SOBER / SAFER / SHACAL / Cryptographic hash function / Q / MISTY1 / SHA-2 / Whirlpool / Camellia / Cryptography / Block ciphers / NESSIE

      Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

      Add to Reading List

      Source URL: www.cosic.esat.kuleuven.be

      Language: English - Date: 2003-02-22 15:34:08
      769Cryptographic hash functions / Hashing / Keccak / BLAKE / Grøstl / Hash function / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

      Microsoft PowerPoint - Presentation_SHA3.pptx

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-05-21 15:47:32
      770SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

      FIPS 180-4, Secure Hash Standard (SHS)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2013-04-29 10:52:30
      UPDATE