SHA

Results: 7306



#Item
301

On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: ice.mat.dtu.dk

Language: English - Date: 2013-06-10 04:26:41
    302

    SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: -

    Add to Reading List

    Source URL: casecurity.org

    Language: English - Date: 2015-06-08 11:59:43
      303

      Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices Tobias Oder Thomas Pöppelmann

      Add to Reading List

      Source URL: www.sha.rub.de

      Language: English - Date: 2014-06-12 05:39:00
        304

        WSFS – Standing Rules Standing Rules for the Governance of the World Science Fiction Society Business Meeting Group 1: Meetings Rule 1.1: Meeting and Session. The Annual Meeting of the World Science Fiction Society sha

        Add to Reading List

        Source URL: wsfs.org

        Language: English - Date: 2013-01-31 02:41:14
          305Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

          Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-09-24 10:22:35
          306

          B ITS S ANDWICHES SMALL PLATES FOR SHA RING

          Add to Reading List

          Source URL: www.lalive.com

          Language: English - Date: 2015-08-17 17:32:50
            307Software / Social networking services / Computing / World Wide Web / Renren / Kaixin001 / Facebook / Twitter / Orkut / Internet privacy / Recommender system

            Understanding Latent Interactions in Online Social Networks Jing Jiang§† , Christo Wilson† , Xiao Wang§ , Peng Huang§ , Wenpeng Sha§ , Yafei Dai§ and Ben Y. Zhao† †

            Add to Reading List

            Source URL: www.cs.ucsb.edu

            Language: English - Date: 2010-09-13 20:04:10
            308Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

            Introduction MD New Results I

            Add to Reading List

            Source URL: www.hyperelliptic.org

            Language: English - Date: 2008-09-27 14:59:29
            309

            SWIFFTX: A Proposal for the SHA-3 Standard Yuriy Arbitman Gil Dogon∗ Vadim Lyubashevsky†

            Add to Reading List

            Source URL: www.di.ens.fr

            Language: English - Date: 2010-10-08 07:53:30
              310

              New  Attacks  on  SHA-­‐3 Adi  Shamir   The  Weizmann  Institute   Israel     Joint  work  with  Itai  Dinur  and  Orr  Dunkelman  

              Add to Reading List

              Source URL: cis.sjtu.edu.cn

              Language: English - Date: 2012-12-05 11:26:12
                UPDATE