SHA-2

Results: 893



#Item
791Skipjack / Crypt / Blowfish / SHA-2 / Feistel cipher / Stream cipher / Cryptography / Cryptographic software / National Security Agency

QDBS GPS Tracking Integration

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:32:50
792

№1 3 月発行 ◆お棺の歴史◆ 現在「棺」には“棺”と“柩”の 2 通りの表記があります。物としてのヒツギが“棺”、

Add to Reading List

Source URL: www.hakuzen-sha.jp

Language: Japanese - Date: 2013-05-24 09:29:24
    793Science / Mathematics / Computational neuroscience / Cryptographic software / Network architecture / Backpropagation / Algorithm / SHA-1 / SHA-2 / Neural networks / Cryptography / Cryptographic hash functions

    Neural Network Approach to Locating Cryptography in Object Code

    Add to Reading List

    Source URL: www.inl.gov

    Language: English - Date: 2014-06-17 06:06:02
    794Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

    Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

    Add to Reading List

    Source URL: www.scienceandmathacademy.com

    Language: English - Date: 2013-06-10 13:55:15
    795Hashing / Collision attack / Preimage attack / MD5 / SHA-2 / Shadow password / HMAC / SHA-1 / Crypt / Cryptography / Error detection and correction / Cryptographic hash functions

    Microsoft PowerPoint - PracticalImpact_talk4

    Add to Reading List

    Source URL: random.mat.sbg.ac.at

    Language: English - Date: 2010-06-09 05:16:35
    796MD4 / Tiger / RIPEMD / SHA-2 / Institute for Applied Information Processing and Communications / Vincent Rijmen / FORK-256 / Hash list / Cryptanalysis / Cryptographic hash functions / Cryptography / SHA-1

    Microsoft PowerPoint - AlternativeHashFunctions_talk5

    Add to Reading List

    Source URL: random.mat.sbg.ac.at

    Language: English - Date: 2010-06-09 05:16:35
    797Road transport / SHA-1 / SHA-2 / CTC / Segregated cycle facilities / Road surface / Kentucky Route 9 / Electronic Arts / Transport / Cryptographic hash functions / Land transport

    CTC PROJECT ALLOCATION LIST FOR MARCH 2014 Project # Allocation Amount Recipient RTPA/CTC Dist-Co-Rte

    Add to Reading List

    Source URL: www.dot.ca.gov

    Language: English - Date: 2014-03-21 12:22:10
    798SHA-2 / FIPS 140 / CDK / SHA-1 / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

    Information Security Corporation

    Add to Reading List

    Source URL: www.infoseccorp.com

    Language: English - Date: 2003-11-12 12:55:13
    799Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / NSA Suite B Cryptography / Federal Information Processing Standard / Digital Living Network Alliance / Universal Plug and Play / FIPS 140-3 / SHA-2 / Cryptography standards / Cryptography / FIPS 140-2

    Microsoft Word - Allegro Press ACE Validated 2013 v1d2-1.docx

    Add to Reading List

    Source URL: www.allegrosoft.com

    Language: English - Date: 2013-12-16 17:39:18
    800Drug addiction / SHA-2 / SHA-1 / NHS strategic health authority / Alcoholism / Ethics / Cryptographic hash functions / Psychiatry / Alcohol abuse

    Norman Lamb: To ask the Secretary of State for Health how many children were born to drug-dependent mothers in each of the last five years, broken down by (a) region and (b) type of drug[removed]Apr 2008 : Column 12

    Add to Reading List

    Source URL: www.foinews.co.uk

    Language: English - Date: 2012-12-12 04:01:35
    UPDATE