SHA-1

Results: 1300



#Item
61Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

Add to Reading List

Source URL: bouncycastle.org

Language: English
62Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / OpenSSL / Heartbleed / Key / GNU Privacy Guard / Public-key cryptography / SHA-1 / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-09-17 23:54:20
63Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
64

INDOCRYPT 09 – Tutorial – “The Design of Code-based Cryptosystems” 1 Code-based Cryptography – Selected publications [1] D. Augot, M. Finiasz, Ph. Gaborit, S. Manuel, and N. Sendrier. SHA-3

Add to Reading List

Source URL: indocrypt09.inria.fr

Language: English - Date: 2009-12-18 10:58:59
    65

    Freestart collision for full SHA-1] Marc Stevens1 o , Pierre Karpman2,3,4 f , and Thomas Peyrin4 b 1 Centrum Wiskunde & Informatica, The Netherlands 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-02-22 06:11:55
      66NIST hash function competition / Cryptography / Skein / SHA-3 / SHA-2 / Grstl / JH / Cryptographic hash function / BLAKE / 64-bit computing / X86-64 / MD6

      sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

      Add to Reading List

      Source URL: www.bolet.org

      Language: English - Date: 2015-09-06 14:06:03
      67

      TERMS AND CONDITIONS OF SALE 1. AREA OF ENFORCEMENT 1.1 These terms and conditions of sale (hereinafter “T&Cs”) shall govern all sale agreements (hereinafter “Sale”) that C.L.M. S.r.l. (hereinafter “CLM”) sha

      Add to Reading List

      Source URL: www.clmramps.com

      Language: English - Date: 2012-12-18 10:36:28
        68

        OL_SHA SHA-1 Processor Rev 1.3 Overview

        Add to Reading List

        Source URL: www.ocean-logic.com

        Language: English - Date: 2011-03-20 21:11:06
          69

          A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

          Add to Reading List

          Source URL: webdocs.cs.ualberta.ca

          Language: English - Date: 2009-10-06 18:16:29
            70

            1 October 3, 2014 PUBLIC COMMENTS ON THE PUBLIC HEALTH STUDY OF THE MARCELLUS SHALE The Maryland Environmental Health Network wishes to submit the following comments to Maryland agencies with regard to the Marcellus Sha

            Add to Reading List

            Source URL: mdehn.org

            Language: English - Date: 2016-01-10 20:51:27
              UPDATE