SHA

Results: 7306



#Item
61Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

- Date: 2005-06-01 07:41:33
    62GERSHON BINYAMIN BURD ‫ז’‘ל‬ ENGLISH JUDAICA LIBRARY The life and example of Gershon Burd ‫ ז’‘ל‬will be memorialized in an English Judaica Library in the beis medresh of Congregation Sha’arei Tzede

    GERSHON BINYAMIN BURD ‫ז’‘ל‬ ENGLISH JUDAICA LIBRARY The life and example of Gershon Burd ‫ ז’‘ל‬will be memorialized in an English Judaica Library in the beis medresh of Congregation Sha’arei Tzede

    Add to Reading List

    Source URL: www.shaareitzedek.com

    - Date: 2014-02-12 00:36:58
      63平成 28 年 12 月 7 日 岡藤商事株式会社 コールセンター インターネット取引「Expert」 サーバ証明書の「SHA-2」方式への切替実施について

      平成 28 年 12 月 7 日 岡藤商事株式会社 コールセンター インターネット取引「Expert」 サーバ証明書の「SHA-2」方式への切替実施について

      Add to Reading List

      Source URL: www.okato.co.jp

      - Date: 2016-12-07 00:54:51
        64toFPGA Implementations of the toRound Two SHA-3 Candidates

        toFPGA Implementations of the toRound Two SHA-3 Candidates

        Add to Reading List

        Source URL: csrc.nist.gov

        - Date: 2012-05-30 14:17:58
          65SHA-2 will soon retire The SHA-3 Song Michael Naehrig Christiane Peters

          SHA-2 will soon retire The SHA-3 Song Michael Naehrig Christiane Peters

          Add to Reading List

          Source URL: www.anagram.com

          - Date: 2010-11-11 14:43:46
            66Comprehensive Comparison of Hardware Performance of Fourteen Round 2 SHA-3 Candidates with 512-bit Outputs Using Field Programmable Gate Arrays Kris Gaj,

            Comprehensive Comparison of Hardware Performance of Fourteen Round 2 SHA-3 Candidates with 512-bit Outputs Using Field Programmable Gate Arrays Kris Gaj,

            Add to Reading List

            Source URL: csrc.nist.gov

            - Date: 2012-05-30 14:38:26
              67Deep Automatic Portrait Matting Xiaoyong Shen(B) , Xin Tao, Hongyun Gao, Chao Zhou, and Jiaya Jia The Chinese University of Hong Kong, Sha Tin, Hong Kong  http://www.cse.cuhk.edu.hk/leojia/projects/

              Deep Automatic Portrait Matting Xiaoyong Shen(B) , Xin Tao, Hongyun Gao, Chao Zhou, and Jiaya Jia The Chinese University of Hong Kong, Sha Tin, Hong Kong http://www.cse.cuhk.edu.hk/leojia/projects/

              Add to Reading List

              Source URL: xiaoyongshen.me

              - Date: 2016-10-09 04:16:35
                68Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

                Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2009-08-26 12:02:39
                  69Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

                  Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

                  Add to Reading List

                  Source URL: www.paypal-knowledge.com

                  - Date: 2015-09-11 15:20:55
                    70Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates using FPGAs? Kris Gaj, Ekawat Homsirikamol, and Marcin Rogawski ECE Department, George Mason University, Fairfa

                    Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates using FPGAs? Kris Gaj, Ekawat Homsirikamol, and Marcin Rogawski ECE Department, George Mason University, Fairfa

                    Add to Reading List

                    Source URL: mason.gmu.edu

                    - Date: 2010-06-26 16:07:12