Back to Results
First PageMeta Content
Hashing / Message authentication codes / HMAC / SHA-2 / Preimage attack / SHA-1 / Collision resistance / Hash function / Crypt / Cryptography / Cryptographic hash functions / Error detection and correction


Document Date: 2012-08-27 10:06:47


Open Document

File Size: 221,38 KB

Share Result on Facebook

Company

AES / Securing Agency Information Systems / /

Facility

National Institute of Standards and Technology / /

IndustryTerm

hash-based key derivation algorithms / agreement algorithm / invertible symmetric-key cryptographic algorithm / cryptographic applications / digital signature algorithm / hash algorithms / transformation algorithm / hash algorithm / digital signature applications / security systems / cryptographic algorithm / /

Organization

National Institute of Standards and Technology / U.S. Department of Commerce / office of Management and Budget / /

Person

Abstract Hash / Patrick Gallagher / John Kelsey / Lily Chen / Daniel Brown / Ray Perlner / Morris Dworkin / Quynh Dang / Praveen Gauravaram / Elaine Barker / Hugo Krawczyk / Donna F. Dodson / William E. Burr / Rebecca M. Blank / W. Timothy Polk / Andrew Regenscheid / Richard Davis / /

Position

author / Acting Secretary / Director / Secretary of Commerce / Director / Acknowledgements The author / Secretary of Commerce under statutory authority / Under Secretary of Commerce / federal official / /

ProgrammingLanguage

K / /

PublishedMedium

Public Law / /

Technology

encryption / hash algorithm / key agreement algorithm / Information Technology / Approved hash algorithms Hash algorithms / seven approved hash algorithms / hash-based key derivation algorithms / Block cipher / hash algorithms / secret key / unvarying transformation algorithm / digital signature / invertible symmetric-key cryptographic algorithm / 6 Approved Hash Algorithms / MAC algorithm An algorithm / digital signature algorithm / 4 Approved Hash Algorithms / cryptographic algorithm / /

SocialTag