SHA-2

Results: 893



#Item
871Computing / Error detection and correction / Search algorithms / SHA-1 / Radio-frequency identification / Hash function / Collision / SHA-2 / RIPEMD / Cryptographic hash functions / Hashing / Cryptography

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 06:16:12
872NIST hash function competition / Hashing / SHA-2 / CubeHash / HMAC / Advanced Encryption Standard / Padding / SHA-1 / Keccak / Error detection and correction / Cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: cubehash.cr.yp.to

Language: English - Date: 2009-09-14 18:24:21
873Secure Hash Standard / Cryptographic hash functions / Computing / Cyberwarfare / Federal Information Processing Standard / Federal Information Security Management Act / Information security / FIPS / SHA-2 / Cryptography / Security / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-07 15:27:28
874Cryptographic hash functions / Hashing / SOBER / SHA-2 / Block cipher modes of operation / Hash function / MD5 / Linear feedback shift register / Scream / Cryptography / Stream ciphers / Error detection and correction

PDF Document

Add to Reading List

Source URL: seer-grog.net

Language: English - Date: 2008-11-10 15:58:11
875Preimage attack / SHA-2 / SHA-1 / MD4 / MD5 / Collision resistance / Tiger / Collision attack / Image / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-03 03:33:03
876Checksum / SHA-1 / Hash function / SHA-2 / Preimage attack / Transmission Control Protocol / Collision attack / Padding / Accumulator / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-20 14:32:33
877Preimage attack / SHA-2 / Public key fingerprint / Merkle–Damgård construction / Hash function security summary / Collision resistance / Hash function / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: isc08.twisc.org

Language: English - Date: 2008-09-14 20:47:12
878Hashing / Message authentication codes / HMAC / SHA-2 / Preimage attack / SHA-1 / Collision resistance / Hash function / Crypt / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-27 10:06:47
879NIST hash function competition / SHA-2 / SHA-1 / Hashing / Skein / Secure Hash Standard / Crypt / NaSHA / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-18 10:39:03
880HMAC / Cryptographic hash function / Cryptographic software / FIPS 140-2 / Key / FIPS 140 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 12:59:18
UPDATE