21![EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes](https://www.pdfsearch.io/img/277c3e78a0e068d1aa83e53dd3cc1a68.jpg) | Add to Reading ListSource URL: www.eecs.umich.eduLanguage: English - Date: 2014-12-24 15:06:41
|
---|
22![HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015 HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015](https://www.pdfsearch.io/img/941b3dc9b4f6f4abb1b04139c384818c.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-22 08:09:52
|
---|
23![Bond 2012 Update Council Briefing February 17, 2015 1
Bond 2012 Update Bond 2012 Update Council Briefing February 17, 2015 1
Bond 2012 Update](https://www.pdfsearch.io/img/03bcb7a8f2f3ec0d6911570bde1c5d39.jpg) | Add to Reading ListSource URL: engineercc.comLanguage: English - Date: 2015-02-18 09:49:25
|
---|
24![Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx](https://www.pdfsearch.io/img/5efb832a0d85eda73b4506f1a29ce7cc.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-21 15:50:50
|
---|
25![Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx](https://www.pdfsearch.io/img/bd205cdaa71f34100fa1ab7274b602d0.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-07 14:15:51
|
---|
26![Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015 Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015](https://www.pdfsearch.io/img/1ce6e0d744b3a2741232c3b7a586474a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-22 08:05:36
|
---|
27![IC2M Security Policy_rel5 IC2M Security Policy_rel5](https://www.pdfsearch.io/img/04aad72ef5dd337e85374b0926de572d.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-28 11:20:09
|
---|
28![Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical](https://www.pdfsearch.io/img/c1e8e6e870b26bddf4bdbc82a2536b88.jpg) | Add to Reading ListSource URL: web.archive.orgLanguage: English |
---|
29![AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it](https://www.pdfsearch.io/img/cdf8a47662888fecaae1d5c92d5aad85.jpg) | Add to Reading ListSource URL: www.dsi.unive.itLanguage: English - Date: 2010-06-10 05:02:59
|
---|
30![IEEE C802.16c-02/02r1Project IEEE C802.16c-02/02r1Project](https://www.pdfsearch.io/img/14d294d3c477dd3dba54b5b9084ae697.jpg) | Add to Reading ListSource URL: wirelessman.orgLanguage: English - Date: 2002-05-23 19:00:39
|
---|