Secure Hash Algorithm

Results: 36



#Item
21

############################################################## Secure Hash Algorithm Message Digest Length = 256 ##############################################################

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 13:10:48
    22

    ############################################################## Secure Hash Algorithm Message Digest Length = 512 ##############################################################

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-08-08 13:12:34
      23Stream cipher / Cryptographic hash function / Pseudorandom number generator / Symmetric-key algorithm / Block cipher / Crypt / Cipher / Outline of cryptography / Cryptographically secure pseudorandom number generator / Cryptography / CRYPTREC / MUGI

      Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

      Add to Reading List

      Source URL: www.ipa.go.jp

      Language: English - Date: 2013-06-19 04:38:45
      24SHA-2 / SHA-1 / Crypt / Hash function / Transport Layer Security / Error detection and correction / Cryptographic hash functions / Cryptography

      The Secure Hash Algorithm Validation System (SHAVS) Updated: May 21, 2014 Created: July 22, 2004 Lawrence E. Bassham III

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2014-05-21 09:13:37
      25Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

      NIST Cryptographic Standards and Guidelines Development Program Briefing Book

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2014-07-10 13:14:41
      26Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

      ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2013-04-16 14:22:13
      27SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

      FIPS 180-4, Secure Hash Standard (SHS)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2013-04-29 10:52:30
      28Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

      Microsoft PowerPoint - preneel_mmm10v1.ppt

      Add to Reading List

      Source URL: homes.esat.kuleuven.be

      Language: English - Date: 2010-09-10 07:39:29
      29Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Group of pictures / Digital signature / Macroblock / Inter frame / H.262/MPEG-2 Part 2 / Video compression / Cryptography / Video

      Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

      Add to Reading List

      Source URL: www.nandakishore.com

      Language: English - Date: 2006-12-26 18:14:00
      30Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Digital signature / Group of pictures / Motion JPEG / H.262/MPEG-2 Part 2 / Inter frame / Video compression / Cryptography / Video

      Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

      Add to Reading List

      Source URL: www.nandakishore.com

      Language: English - Date: 2006-12-26 18:14:17
      UPDATE