Hashing

Results: 1317



#Item
991Cryptographic hash functions / URI schemes / Hash function / Fragment identifier / Hash list / Information / Artificial intelligence / Error detection and correction / Hashing / Search algorithms

Vassil Roussev The Current Forensic Workflow Forensic Target (3TB)

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:02
992Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:54:42
993Cryptography / Hashing / Checksum / Cksum / MD5 / Hash function / File verification / SHA-2 / Sum / Computing / Cryptographic hash functions / Software

Checksum Programs Evaluation Summary Being able to verify that a file has not changed overtime at the bit level can be done by creating and monitoring the fixity of a file. Fixity can be generated on the server side, and

Add to Reading List

Source URL: www.mnhs.org

Language: English - Date: 2014-04-22 17:26:10
994Public-key cryptography / Preimage attack / Hash function / Digital Signature Algorithm / Collision / Digital signature / Crypt / Collision attack / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

NIST SP[removed], Randomized Hashing for Digital Signatures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:45:25
995Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-17 01:00:00
996Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / HMAC / Block cipher / Key size / SHA-1 / Symmetric-key algorithm / Padding / Cryptography / Cryptographic hash functions / Hashing

Cryptolite Security Policy-o.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
997Cryptographic software / Microsoft CryptoAPI / Key generation / Key / Crypt / Public-key cryptography / Symmetric-key algorithm / Hash function / Password / Cryptography / Key management / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
998Data / Cryptographic protocols / Tunneling protocols / HMAC / Hashing / Advanced Encryption Standard / IPsec / Cryptography standards / Cryptography / Computing / Internet protocols

Microsoft Word[removed]001_d.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-31 00:00:00
999Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
1000Cryptography standards / Cryptographic hash functions / Message authentication codes / HMAC / Hashing / Secure Shell / SHA-2 / SHA-1 / FIPS 140-2 / Cryptography / Error detection and correction / Cryptographic software

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE