Secure Hash Algorithms

Results: 25



#Item
21Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
22Search algorithms / Provably secure cryptographic hash function / Applied mathematics / Fast Syndrome Based Hash / Hash function / One-way function / Cyberwarfare / Collision resistance / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-05 07:41:01
23Hashing / Search algorithms / SHA-1 / SHA-2 / Hash function / Padding / HMAC / Bit array / Provably secure cryptographic hash function / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:56
24Search algorithms / Collision attack / Preimage attack / Hash function / Collision / Merkle–Damgård construction / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-03-11 05:27:18
25SHA-1 / Search algorithms / MD4 / Hash function / Collision attack / Collision / Secure Hash Standard / SHA-2 / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-04 12:28:25
UPDATE