Back to Results
First PageMeta Content
Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions


[Federal Register: September 12, 1997 (Volume 62, Number 177)]
Add to Reading List

Document Date: 2012-06-20 11:13:28


Open Document

File Size: 123,91 KB

Share Result on Facebook

/

Facility

National Institute of Standards and Technology / Information Technology Laboratory / /

/

IndustryTerm

satellite applications / voice applications / submitted media / hash algorithm / test software / candidate hash algorithms / candidate algorithm / cryptographic applications / digital signature algorithm / hash algorithms / replacement hash algorithm / insecure applications / candidate algorithms / optical media / /

Organization

Family AGENCY / Miscellaneous Authority / National Institute of Standards and Technology / Information Technology Laboratory / Department of Commerce / /

/

Position

Disclosures General / General / Governor / designer / /

ProgrammingLanguage

Hardware Description Language / ANSI C / /

ProvinceOrState

Maryland / /

PublishedMedium

Public Law / /

Technology

160-bit replacement hash algorithm / candidate algorithms / alternative algorithms / NIST-approved hash algorithm / hash algorithm / ANSI C / Information Technology / API / submitted algorithms / selected SHA-3 algorithm / operating system / PDF / Encryption / Cryptography / submitted algorithm / candidate hash algorithms / candidate algorithm / hash algorithms / Evaluation Criteria 4.A Security 4.B Cost 4.C Algorithm / Cryptographic Hash Algorithm / 8-bit processors / Digital Signature / 2.B Algorithm / digital signature algorithm / SHA-3 algorithm / SHA-0 algorithms / /

URL

http /

SocialTag