First Page | Document Content | |
---|---|---|
Date: 2015-08-04 11:33:21Cryptography Cryptographic hash functions Hashing Message authentication codes Error detection and correction Secure Hash Algorithm SHA-2 Secure Hash Standard SHA-1 SHA-3 Crypt Digital Signature Algorithm | FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITYAdd to Reading ListSource URL: nvlpubs.nist.govDownload Document from Source WebsiteFile Size: 813,78 KBShare Document on Facebook |
E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)DocID: 1xTSa - View Document | |
ES1 TSRS 2001 Crypt of Mandazed An Easy Solo AdventureDocID: 1vbDJ - View Document | |
PERFORMING FUTURE FINANCE THE CRYPT OF ART, THE DECRYPTION OF MONEY, THE ENCRYPTEDDocID: 1uGzz - View Document | |
CRYPT(3) Library functions CRYPT(3)DocID: 1ut1N - View Document | |
1 Legendary monster: Gorgis Iron-mane The crypt has become your hunting ground. Stepping over the bodies of the black-robed necromancers, you plunge onwards – the cold fire from your shadow mark illuminating the narrowDocID: 1u6a7 - View Document |