SHA-2

Results: 893



#Item
81On collisions of hash functions Turbo SHA-2

On collisions of hash functions Turbo SHA-2

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-01-06 12:58:03
    82Christian Grothoff  COMP 3704 Computer Security Christian Grothoff

    Christian Grothoff COMP 3704 Computer Security Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2011-06-21 07:45:47
    83OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

    OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

    Add to Reading List

    Source URL: openssl.org

    Language: English - Date: 2007-12-13 15:11:03
    84EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

    EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2014-12-24 15:06:41
    85On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Version 2.0, November 18, 2010 Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont Bradley Department of Electrical and Computer Engineering

    On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Version 2.0, November 18, 2010 Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont Bradley Department of Electrical and Computer Engineering

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-11-19 04:19:44
    86Crypto-WorldA. Do druhéhokola soutěže SHA-3 postoupilo 14 kandidátů, mezi nimi i BMW Vlastimil Klíma, nezávislý krypotolog, () Podle oficiální zprávy zNIST vybral do 2.

    Crypto-WorldA. Do druhéhokola soutěže SHA-3 postoupilo 14 kandidátů, mezi nimi i BMW Vlastimil Klíma, nezávislý krypotolog, () Podle oficiální zprávy zNIST vybral do 2.

    Add to Reading List

    Source URL: cryptography.hyperlink.cz

    Language: Czech - Date: 2009-09-10 03:21:36
      87Integrated Services for People with Long-term Neurological Conditions: Evaluation of the Impact of the National Service Framework:  Appendices ProjectSylvia Bernard, Fiona Aspinal, Kate Gridley, Gillian Par

      Integrated Services for People with Long-term Neurological Conditions: Evaluation of the Impact of the National Service Framework:  Appendices ProjectSylvia Bernard, Fiona Aspinal, Kate Gridley, Gillian Par

      Add to Reading List

      Source URL: www.york.ac.uk

      Language: English - Date: 2010-09-28 05:08:23
      88SCTS-SC Appendix C Codelists Version

      SCTS-SC Appendix C Codelists Version

      Add to Reading List

      Source URL: www.tullverket.se

      Language: English - Date: 2013-06-12 06:23:19
      89VLSI  Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security SHA-3, Round 2 Tweaks Candidate

      VLSI Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security SHA-3, Round 2 Tweaks Candidate

      Add to Reading List

      Source URL: ehash.iaik.tugraz.at

      - Date: 2009-09-23 05:47:20
        90CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

        CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

        Add to Reading List

        Source URL: www.dot.ca.gov

        Language: English - Date: 2015-03-30 14:06:57