Back to Results
First PageMeta Content
Error detection and correction / Message authentication codes / Search algorithms / HMAC / Hash function / Collision / Digital signature / Algorithm / SHA-2 / Cryptography / Hashing / Cryptographic hash functions


Comments on NIST Draft Requirements and Criteria for Hash Algorithm
Add to Reading List

Document Date: 2012-06-20 09:56:14


Open Document

File Size: 306,29 KB

Share Result on Facebook

City

Hawthorne / Ottawa / /

Company

IBM / Cambridge University Press / CBC / Artifcial Intelligence Laboratory / the AES / /

Country

United States / /

/

Facility

The National Institute of Standards and Technology / National Institute of Standards / Massachusetts Institute of Technology / University of Bristol / /

IndustryTerm

candidate algorithm / feasible multiparty computation protocol / pro posed algorithms / keyed modes algorithm / hash algorithms / deterministic algorithm / hash algorithm / related algorithms / keyed modes algorithms / candidate algorithms / /

MusicGroup

Cascade / /

NaturalFeature

Side channel / /

OperatingSystem

Linux / Fedora / /

Organization

National Institute of Standards and Technology / Cambridge University / Massachusetts Institute of Technology / /

Person

Jean Pierre Seifert / Eran Tromer / Arne Osvik / Marc Stevens / Ron Steinfeld / Tim Polk / Chris Crutchfeld / Ron Rivest Eran Tromer / Tal Rabin / Ron Rivest / Rosario Gennaro / Colin Percival / Scott Contini / Daniel Page / Quynh Dang / Johan Hastad / Kazuhiko Minematsu / Oded Goldreich / Mayank Varia / Hugo Krawczyk / Hiroshi Miyauchi / Etsuko Tsujihara / /

Product

Thunderbird / /

ProvinceOrState

New York / Massachusetts / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

keyed modes algorithms / aforementioned algorithm / Well related algorithms / candidate algorithms / Cryptography / hash algorithm / pro posed algorithms / Linux / candidate algorithm / feasible multiparty computation protocol / hash algorithms / cache memory / proposed algorithms / VSH algorithm / keyed modes algorithm / /

URL

http /

SocialTag