SHA

Results: 7306



#Item
281Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:33:21
282

Titli (2014), Kanu Behl– IFFLA, April 9, 2015 world-cinema.org /titli-2014-kanu-behl-iffla-aprilShekhar Deshpande | April 9, 2015 | 0 Comments There was always some taint to the notion of poverty in India. Sha

Add to Reading List

Source URL: www.indianfilmfestival.org

Language: English - Date: 2015-05-10 14:47:54
    283

    Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

    Add to Reading List

    Source URL: www.groestl.info

    Language: English - Date: 2011-10-06 10:54:44
      284

      Copyrights © 2014 Human Rights Centre All rights reserved Human Rights Centre Sha’ab Area, Behind Youth Stadium (Garoonka Dhalinta) Hargeisa Somaliland

      Add to Reading List

      Source URL: e-voice.org.uk

      Language: English - Date: 2014-12-10 06:12:22
        285

        INSPIRATION IN ACTION BLUE ROOM TALKS A highlight of the UNV Partnerships Forum was the session titled, ‘Inspiration in Action – Blue Room Talks’. Eight UN Volunteers from across the globe took centre stage to sha

        Add to Reading List

        Source URL: www.unv.org

        Language: English - Date: 2015-06-24 07:32:36
          286Software engineering / Programming language theory / Theoretical computer science / C++ / Logic in computer science / Proof assistants / Data types / SHA-2 / Formal verification / Separation logic / Coq / Functional programming

          Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f

          Add to Reading List

          Source URL: www.cs.princeton.edu

          Language: English - Date: 2014-12-23 10:16:22
          287

          Hyatt Regency Hong Kong, Sha Tin 18 Chak Cheung Street, Sha Tin New Territories, Hong Kong Please return form to: Reservations Office Phone: Fax:

          Add to Reading List

          Source URL: conferences.sigcomm.org

          Language: English - Date: 2013-07-08 12:04:36
            288

            Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware Thomas P¨oppelmann and Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security, Ruhr University Bochum, Germany

            Add to Reading List

            Source URL: www.sha.rub.de

            Language: English - Date: 2013-08-14 17:59:02
              289

              The State of DCIO Distribution: 2012 Making the Most of Limited Resources to Thrive in a Maturing Market Overview The DCIO market is producing strong flows for asset managers, yet the gap is increasing between market sha

              Add to Reading List

              Source URL: www.heartsandwallets.com

              Language: English - Date: 2012-06-05 10:05:09
                290

                Area Optimization of Lightweight Lattice-Based Encryption on Reconfigurable Hardware Thomas P¨oppelmann Tim G¨uneysu

                Add to Reading List

                Source URL: www.sha.rub.de

                Language: English - Date: 2014-03-23 10:02:43
                  UPDATE