Back to Results
First PageMeta Content
Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing


Cryptography Research and Evaluation Committees
Add to Reading List

Document Date: 2012-06-20 09:58:12


Open Document

File Size: 32,81 KB

Share Result on Facebook

Company

the AES / /

/

IndustryTerm

optimized software/hardware implementation / software version / Internet Mail Service / /

Person

Debby Wallner / /

Position

General / bad programmer / /

ProgrammingLanguage

C / /

Technology

64-bit processor / counter mode encryption / /

SocialTag