SHA-1

Results: 1300



#Item
851MidPoint Music Festival / Radio New Zealand Concert

SHA-logo-redo-finl-1_WHITE

Add to Reading List

Source URL: www.yearofalabamamusic.com

Language: English - Date: 2013-01-17 15:15:14
852Kryptonians / SHA-1 / Institute for Applied Information Processing and Communications / DC Comics / Cryptographic hash functions / Krypto

Finding SHA-1 Characteristics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:14:58
853Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
854Message authentication codes / HMAC / Internet protocols / Cryptographic hash functions / Cryptographic protocols / Collision attack / MD4 / MD5 / SHA-1 / Cryptography / Error detection and correction / Hashing

Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:27:16
855Hashing / SHA-2 / SHA-1 / Collision attack / MD4 / HMAC / RadioGatún / Preimage attack / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Error detection and correction

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:08:30
856Universal one-way hash function / SHA-1 / SHA-2 / Hash function / Hash list / Cryptographic primitive / Collision / MD5 / One-way function / Cryptographic hash functions / Error detection and correction / Cryptography

1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:38:20
857SHA-1 / SHA-2 / Merkle–Damgård construction / Hash function / Crypt / Provably secure cryptographic hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
858SHA-1 / SHA-2 / Hash list / Hash function / Merkle–Damgård construction / Crypt / MD5 / NIST hash function competition / RIPEMD / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Word - Workshop 2 proposal.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:53:44
859Computer security / Cryptography standards / Microsoft CryptoAPI / FIPS 140-2 / Cryptographic Service Provider / FIPS 140 / SHA-1 / CryptGenRandom / Crypto++ / Cryptography / Cryptographic software / Computing

Microsoft Word - 01o - TC-SecPol-27.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
860Cryptosystem / Key size / SHA-1 / Data Encryption Standard / FIPS 140-2 / Message authentication code / Advanced Encryption Standard / Public-key cryptography / Transport Layer Security / Cryptography / Key management / Cryptographic hash functions

Securit-e-Doc® SITT® CryptoSystem FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE