SHA

Results: 7306



#Item
311

B ITS SMALL PLATES FOR SHA RING C H I L L E D G OL DE N T O M A T O S O U P |9

Add to Reading List

Source URL: www.lalive.com

Language: English - Date: 2015-08-17 17:32:50
    312

    Analysis of Step-Reduced SHA-256

    Add to Reading List

    Source URL: fse2006.iaik.tugraz.at

    Language: English - Date: 2013-02-04 08:11:49
      313

      Software Speed Records for Lattice-Based Signatures Tim G¨ uneysu1 , Tobias Oder1 , Thomas P¨oppelmann1 , and Peter Schwabe2 1 2

      Add to Reading List

      Source URL: www.sha.rub.de

      Language: English - Date: 2013-04-03 04:15:43
        314

        A Collision for 70-step SHA-1 in a Minute

        Add to Reading List

        Source URL: fse2007.uni.lu

        Language: English - Date: 2007-05-23 09:26:00
          315Computing / Cryptography / Secure communication / Software / Cryptographic software / Mbed TLS / Cryptographic protocols / Internet protocols / Transport Layer Security / SHA-1 / Cipher suite / ARM Holdings

          PolarSSLverification kit V1.0 Evaluation version –

          Add to Reading List

          Source URL: trust-in-soft.com

          Language: English - Date: 2015-09-11 09:21:10
          316

          Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware Thomas P¨oppelmann and Tim G¨ uneysu∗ Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum, Germany

          Add to Reading List

          Source URL: www.sha.rub.de

          Language: English - Date: 2012-07-24 09:24:23
            317Cryptography / Cryptographic protocols / Public-key cryptography / Search algorithms / Elliptic Curve Digital Signature Algorithm / Elliptic curve cryptography / Hash function / X.509 / SHA-2

            RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

            Add to Reading List

            Source URL: www.ietf.org

            Language: English - Date: 2015-07-23 10:29:05
            318

            1 ]n¶m¡ kap-Zmb hnI-k\ hIp¸vv Ub-d-IvS-dpsS Imcym-ebw A¿-³Imfn `h³ þ \memw \ne, I\-I-\-KÀ, shÅ-b-¼-ew, Xncp-h-\-´-]pcw þ t^m¬/^mIvkv þ , email : Website : www.b

            Add to Reading List

            Source URL: scholarship.itschool.gov.in

            Language: English - Date: 2015-10-05 01:52:54
              319

              ECM Nik Bärtsch’s Ronin Llyrìa Nik Bärtsch piano; Sha: bass clarinet, alto saxophone; Björn Meyer: bass; Kaspar Rast: drums; Andi Pupato: percussion ECM 2178

              Add to Reading List

              Source URL: www.nikbaertsch.com

              Language: German - Date: 2013-12-17 17:24:19
                320Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

                Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

                Add to Reading List

                Source URL: www.oceanstore.org

                Language: English - Date: 2003-03-13 15:50:35
                UPDATE