Back to Results
First PageMeta Content
Hashing / SHA-2 / SHA-1 / NIST hash function competition / Padding / Hash function / Crypt / Checksum / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions


Document Date: 2008-12-11 06:34:13


Open Document

File Size: 79,90 KB

Share Result on Facebook

Company

Intel / Microsoft / /

Facility

KB Windows XP Professional Microsoft Visual Studio / /

IndustryTerm

hash algorithm / cryptographic algorithms / /

OperatingSystem

Windows XP Professional / /

Person

Unless / Cryptographic Hash Algorithms Colin Bradbury / Cryptographic Hash / /

Position

system designer / /

ProgrammingLanguage

ANSI C / Verilog / /

Technology

corresponding SHA-2 algorithm / 1.1 Algorithm / 8-bit processors / 8-bit processors Platform/processor / hash algorithm / Verilog / submitted algorithm / Operating system / proposed algorithm / 2.5 Hash algorithm / ANSI C / SHA-1 algorithm / four algorithms / 1.4 Constants These algorithms / SHA-2 algorithms / little-endian / API / 2.4 Hash algorithm / 2.7 Hash algorithm / PDF / 2.6 Hash algorithm / /

SocialTag