Hash functions

Results: 1148



#Item
51Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
52Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
53Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-28 11:33:56
54Microsoft Word - Indo-US-Workshop-jaja.doc

Microsoft Word - Indo-US-Workshop-jaja.doc

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2009-05-12 14:48:13
55LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
56Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
57Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
58Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
59The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:29
60Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13