Back to Results
First PageMeta Content
Advanced Encryption Standard / Hashing / CRYPTREC / SHA-2 / National Security Agency / SHA-1 / Crypt / NESSIE / Secure Hash Standard / Cryptography / Cryptographic hash functions / Cryptography standards


X-Sieve: CMU Sieve[removed]Subject: Hash Algorithm Requirements and Evaluation Criteria. Date: Tue, 24 Apr[removed]:33:[removed]
Add to Reading List

Document Date: 2012-06-20 08:18:28


Open Document

File Size: 319,92 KB

Share Result on Facebook

Company

Central Michigan University Research Corporation / Advanced Micro Devices Inc / Defense and Energy / NSA / Twofish / the AES / IBM / eBay / Sun Microsystems / Oracle / Intel / Microsoft / /

Country

Japan / United States / /

Currency

USD / /

/

Facility

Commerce’s National Institute of Standards and Technology / University Research Corporation Due to / National Institute of Standards and Technology / National Institute of Health / Library Systems Department Park Library Central Michigan University Mount Pleasant / American National Standards Institute / NSA's National Information Assurance Research Laboratory / Evaluation Criteria National Institute of Standards and Technology / DEPARTMENT OF COMMERCE National Institute of Standards and Technology / /

IndustryTerm

encryption software / software/security firms / large software / designed and constructed encryption devices / elegant algorithms / Internet transactions / online economy / actual secure systems / final product / rigorous mathematical solution / diverse operating systems / wireless nodes / cryptographic hash algorithm / software encryption solutions / governmental systems / in mobile battery powered systems / Internet community / good and sound cryptographic protocols / wire networks / software engineers / software security / / public network / good algorithms / cryptographic protocols / encryption protocols / cryptographic systems / final end product / software suitability / cryptographic protocol / candidate algorithms / /

Organization

Japan’s Cryptography Research and Evaluation Committee / U.S. Department of Commerce / US Government / American National Standards Institute / U.S. Department of Commerce’s National Institute of Standards and Technology / office of Management and Budget / U.S. Securities and Exchange Commission / National Institute of Standards and Technology / Central Michigan University / National Institute of Health / National Security Agency / Cryptography Research and Evaluation Committee / National Science Foundation / DEPARTMENT OF COMMERCE National Institute of Standards and Technology / General Accounting Office / United States government / International Electrotechnical Commission / National Security Agency/Central Security Service / IPv6 / X9 and International Organization for Standardization / Department of Defense / NSA's National Information Assurance Research Laboratory / /

Person

John Kelsey Niels Ferguson / Mike Stay / Jean Jacques Quisquater / Stefan Mangard / Daniel J. Bernstein / James E. Hill / Daniel Fidel Ferrer / William Burr / Truman / Francois Koeune / Bruce Schneier / Daniel Ferrer / Eric Willoughby / /

/

Position

President / General / Secretary / competent implementation programmer / Director / general public program / human programmer / /

Product

Stream / /

ProgrammingLanguage

ANSI C / /

ProvinceOrState

California / Maryland / /

PublishedMedium

Public Law / the PUBLIC LAW / /

Region

Central Michigan / /

Technology

candidate algorithms / hardware encryption / optical fiber / Encryption / awfully good and sound cryptographic protocols / cryptography / exceedingly good encryption / network encryption / IPv6 / ANSI C / cryptographic protocol / operating systems / pdf / rigorously good algorithms / encryption protocols / cryptographic protocols / link encryption / /

URL

http /

SocialTag