Secure Hash Standard

Results: 51



#Item
31Computing / Cryptographic hash functions / Hashing / SHA-2 / Bouncy Castle / HMAC / SHA-1 / IPsec / Secure Hash Standard / Cryptography / Cryptographic software / Error detection and correction

Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2014-05-14 07:46:41
32Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
33Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
34Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
35Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
36SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
37Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
38Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Group of pictures / Digital signature / Macroblock / Inter frame / H.262/MPEG-2 Part 2 / Video compression / Cryptography / Video

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:00
39Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Digital signature / Group of pictures / Motion JPEG / H.262/MPEG-2 Part 2 / Inter frame / Video compression / Cryptography / Video

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:17
40Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
UPDATE