Hash functions

Results: 1148



#Item
181Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
1821  Physical One-Way Functions by  Pappu Srinivasa Ravikanth

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
183Basic Font Attributes - Font Family  Page 1 Basic Font Attributes - Font Family This test contains examples of basic character-level formatting - different font families.

Basic Font Attributes - Font Family Page 1 Basic Font Attributes - Font Family This test contains examples of basic character-level formatting - different font families.

Add to Reading List

Source URL: xep.xattic.com

Language: English - Date: 2004-10-22 12:25:26
184Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson  Alex Aiken

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: daniel-wilkerson.appspot.com

Language: English
185Living with post quantum cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
186ABOUT goTrace is developed by United Nations Office on Drugs and Crime (UNODC). The United Kingdom provided the goTrace Project with seed funding inThis has allowed a prototype to be developed and offered for tri

ABOUT goTrace is developed by United Nations Office on Drugs and Crime (UNODC). The United Kingdom provided the goTrace Project with seed funding inThis has allowed a prototype to be developed and offered for tri

Add to Reading List

Source URL: www.imolin.org

Language: English - Date: 2015-03-20 06:35:24
187Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-07-03 11:52:33
188Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands  January 29, 2012

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
189TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

Add to Reading List

Source URL: www.movable-type.co.uk

Language: English - Date: 2009-06-02 07:28:40
190Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58