SHA-1

Results: 1300



#Item
91Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: www.oceanstore.org

Language: English - Date: 2003-03-13 15:50:35
92

New collision attacks on SHA-1 based on optimal joint local-collision analysis Marc Stevens CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-03-08 06:18:23
    93

    Rider for Sha Na Na www.shanana.com -------------------------------------------------------------------------------------------------------CONTENTS OF SHA NA NA RIDER p.1 LEGAL p.2 GROUND / HOUSING / AIR / CATERING / HOS

    Add to Reading List

    Source URL: www.shanana.com

    Language: English - Date: 2015-03-09 16:07:40
      94Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

      A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:26
      95

      SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2011-12-11 02:10:14
        96

        Capti Narrator 1.0 Will Narrate Anything You Want to Read in Firefox on Windows and Mac Computers FOR IMMEDIATE RELEASEPress Contact: Sha Li: _Phone: Stony Brook, New Y

        Add to Reading List

        Source URL: www.captivoice.com

        Language: English
          97

          Maryland SHA Bicycle and Pedestrian Design Guidelines CHAPTER 2: PAVED SHOULDERS 2.1 General Purpose of Shoulders Throughout Maryland, roadway shoulders may be constructed of any material from the same high grade paving

          Add to Reading List

          Source URL: www.sha.maryland.gov

          Language: English - Date: 2010-06-23 19:59:07
            98Cryptographic hash function / Hash function / SHA-1 / Tiny Encryption Algorithm / Free60 / Homebrew / Cryptography / Xbox / Search algorithms

            Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

            Add to Reading List

            Source URL: www.xenatera.com

            Language: English - Date: 2003-04-17 04:53:36
            99

            Programme Detail Date: 14th April 2014 Time: 9:00 am – 6:00 pm Venue: Charles K. Kao Auditorium, 1/F, Lakeside 2, Hong Kong Science Park, Pak Shek Kok, Sha Tin, Hong Kong

            Add to Reading List

            Source URL: www.itshk.org

            Language: English - Date: 2014-04-06 23:17:01
              100Hashing / Computing / Information retrieval / Cryptography / Causality / Version vector / Hash table / Hash function / SHA-1 / Search algorithms / Mathematics / Cryptographic hash functions

              Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

              Add to Reading List

              Source URL: oceanstore.cs.berkeley.edu

              Language: English - Date: 2003-03-13 15:50:35
              UPDATE