Secure Hash Algorithm

Results: 36



#Item
11Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
12Public-key cryptography / Internet standards / Secure communication / Transport Layer Security / Cipher suite / SHA-2 / Collision attack / SHA-1 / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:39
13SHA-1 / Digital Signature Algorithm / Secure Hash Standard / Data Encryption Standard / Hash function / MD4 / SHA-2 / MD5 / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS[removed]Secure Hash Standard Page 1 of 21 Return to the FIPS Home Page

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:20
14Advanced Encryption Standard / Hashing / CRYPTREC / SHA-2 / National Security Agency / SHA-1 / Crypt / NESSIE / Secure Hash Standard / Cryptography / Cryptographic hash functions / Cryptography standards

X-Sieve: CMU Sieve[removed]Subject: Hash Algorithm Requirements and Evaluation Criteria. Date: Tue, 24 Apr[removed]:33:[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:18:28
15Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
16NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
17Stochastic control / Verlet integration / Optimal projection equations / Cybernetics / Control theory / Optimal control

############################################################## Secure Hash Algorithm Message Digest Length = 160 ############################################################## One Block Message Sample

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 13:02:44
18

############################################################## Secure Hash Algorithm Message Digest Length = 384 ##############################################################

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 13:11:46
    19Optimal control / Stochastic control / Signal processing / Mathematical analysis / Optimal projection equations / Verlet integration / Cybernetics / Calculus / Control theory

    ############################################################## Secure Hash Algorithm Message Digest Length = 160 ############################################################## One Block Message Sample

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-08-08 13:20:00
    20

    ############################################################## Secure Hash Algorithm Message Digest Length = 224 ##############################################################

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-08-08 13:09:32
      UPDATE