SHA-2

Results: 893



#Item
71Microsoft PowerPoint - preneel_enisa08v4.ppt

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
72draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3

draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3

Add to Reading List

Source URL: tools.ietf.org

- Date: 2015-04-22 05:03:32
    73Vlastimil Klíma: Predikce finalistů SHA-3, Crypto-World, pp. 2-3, ISSN, 20.prosinec 2009 B. Predikce finalistů SHA-3, Vlastimil Klíma, kryptolog konzultant, Praha (http://cryptography.hyperlink.cz,

    Vlastimil Klíma: Predikce finalistů SHA-3, Crypto-World, pp. 2-3, ISSN, 20.prosinec 2009 B. Predikce finalistů SHA-3, Vlastimil Klíma, kryptolog konzultant, Praha (http://cryptography.hyperlink.cz,

    Add to Reading List

    Source URL: cryptography.hyperlink.cz

    - Date: 2009-12-25 01:34:04
      74Crypto-WorldB. Generické kolizní útoky na úzké hašovací funkce rychlejší než narozeninový paradox, aplikovatelné na třídy funkcí MDx, SHA-1, SHA-2 a úzké kandidáty na SHA-3 Vlastimil Klíma,

      Crypto-WorldB. Generické kolizní útoky na úzké hašovací funkce rychlejší než narozeninový paradox, aplikovatelné na třídy funkcí MDx, SHA-1, SHA-2 a úzké kandidáty na SHA-3 Vlastimil Klíma,

      Add to Reading List

      Source URL: cryptography.hyperlink.cz

      - Date: 2010-08-12 16:00:57
        75Extension Leadership Team -Initiative 2 -Water Meeting NOTES (Lisette Staal) Date: October 3, 2012 – 2-4 pm in room 1066 McCarty D and Polycom Leadership Team: Wendy Graham, Mark Clark, Kelly Morgan, Michael Dukes, Sha

        Extension Leadership Team -Initiative 2 -Water Meeting NOTES (Lisette Staal) Date: October 3, 2012 – 2-4 pm in room 1066 McCarty D and Polycom Leadership Team: Wendy Graham, Mark Clark, Kelly Morgan, Michael Dukes, Sha

        Add to Reading List

        Source URL: waterinstitute.ufl.edu

        - Date: 2012-10-16 11:08:02
          76O kolizích hašovací funkce Turbo SHA-2

          O kolizích hašovací funkce Turbo SHA-2

          Add to Reading List

          Source URL: cryptography.hyperlink.cz

          Language: Czech - Date: 2008-01-06 12:58:03
            77On collisions of hash functions Turbo SHA-2

            On collisions of hash functions Turbo SHA-2

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2008-01-01 15:20:21
              78九龍尖沙咀柯士甸道 122 號麗斯中心 2 樓  2/F Ritz Plaza, 122 Austin Road, Tsim Sha Tsui, Kowloon, Hong Kong 九龍尖沙咀柯士甸道 122 號麗斯中心 2 樓

              九龍尖沙咀柯士甸道 122 號麗斯中心 2 樓 2/F Ritz Plaza, 122 Austin Road, Tsim Sha Tsui, Kowloon, Hong Kong 九龍尖沙咀柯士甸道 122 號麗斯中心 2 樓

              Add to Reading List

              Source URL: www.harvest.org.hk

              - Date: 2012-05-26 04:50:57
                79Reprinted with permission from The Guardian, 2 May 1986 Nobody should feel complacent about the Chernobyl disaster. Nuclear accidents can develop in some bizarre ways, warns Walt Patterson The cloud that could cast a sha

                Reprinted with permission from The Guardian, 2 May 1986 Nobody should feel complacent about the Chernobyl disaster. Nuclear accidents can develop in some bizarre ways, warns Walt Patterson The cloud that could cast a sha

                Add to Reading List

                Source URL: www.waltpatterson.org

                Language: English - Date: 2009-02-28 16:21:49
                  80Journal of Jewish Identities 2009, 2(1)  The “Gate of Heaven”(Sha’ar Hashamayim) Synagogue in Cairo): On the Contextualization of Jewish Communal Architecture

                  Journal of Jewish Identities 2009, 2(1) The “Gate of Heaven”(Sha’ar Hashamayim) Synagogue in Cairo): On the Contextualization of Jewish Communal Architecture

                  Add to Reading List

                  Source URL: bassatine.net

                  Language: English - Date: 2010-10-19 12:59:47