Back to Results
First PageMeta Content
Hashing / Search algorithms / SHA-1 / SHA-2 / Hash function / Padding / HMAC / Bit array / Provably secure cryptographic hash function / Error detection and correction / Cryptographic hash functions / Cryptography


Document Date: 2008-12-11 07:01:56


Open Document

File Size: 459,82 KB

Share Result on Facebook

City

Hyderabad / /

Company

IBM / Tata Consultancy Services Limited / Hitachi Ltd / Microsoft / /

Country

United States / /

Event

Natural Disaster / /

Facility

National Institute of Standards and Technology / /

IndustryTerm

good hashing algorithm / secure hash algorithm / hash algorithm / message pre processing function / overall algorithm / digital signature technology / /

MusicAlbum

Avalanche / /

Organization

National Institute of Standards and Technology / Group of Eight / /

Person

N. Vijayarangan / Mallika Choudhuri / K. Ananth Krishnan / Chalamala Srinivasa Rao / Rajgopal Srinivasan / Priya V. Som / Sitaram Chamarty / Divya Vyas / B.N. Kishore / M. Vidyasagar / A. Sarangarajan / /

Position

MP / /

PublishedMedium

the Message Digest / /

Technology

9 Khichidi-1 Algorithm / Khichidi-1 hash algorithm / good hashing algorithm / hash algorithm / overall algorithm / 8 Khichidi-1 Algorithm / designing Khichidi-1 algorithms / Functions Khichidi-1 Algorithm / 5 Khichidi-1 Algorithm / digital signature technology / 7 Khichidi-1 Algorithm / secure hash algorithm / Khichidi-1 Algorithm / 6 Khichidi-1 Algorithm / 2.2 Algorithm / 2 Khichidi-1 Algorithm / 19 3 Khichidi-1 Algorithm / 94 4 Khichidi-1 Algorithm / /

SocialTag