SHA-1

Results: 1300



#Item
871PKCS / FIPS 140-2 / FIPS 140 / Key Wrap / SHA-2 / HMAC / Advanced Encryption Standard / Cryptographic Module Validation Program / SHA-1 / Cryptography / Cryptography standards / Network Security Services

Microsoft Word - Security_ Policy_Wind_River_NSS_0801.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
872Algebraic geometry / Commutative algebra / Gröbner basis / Invariant theory / Forward error correction / Decoding / Algebra / Mathematics / Computer algebra

Gröbner Base Based Cryptanalysis of SHA-1 Makoto Sugita IPA Security Center Joint work with Mitsuru Kawazoe (Osaka Prefecture university) and Hideki Imai (Chuo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:15:04
873Data Encryption Standard / SHA-1 / FIPS 140-2 / FIPS 140 / HMAC / RC5 / DES-X / Block cipher / Crypto++ / Cryptography / Cryptographic software / Cryptography standards

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
874Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
875Collision attack / SHA-2 / MD5 / Hash function / MD4 / RSA / Provably secure cryptographic hash function / One-way compression function / Cryptography / Cryptographic hash functions / SHA-1

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
876Cryptographic protocols / Internet protocols / Internet standards / SHA-2 / SHA-1 / Online Certificate Status Protocol / Cambridge Rindge and Latin School / Cryptography / Cryptographic hash functions / Public-key cryptography

Shared Service Providers Com m on Policy, Certificate and CRL Profile, and Repository Profile David Cooper and Nelson Hastings January 14, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
877Hashing / Search algorithms / Collision attack / Hash function / SHA-1 / Merkle–Damgård construction / MD4 / Steganography / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Using Steganography to Improve Hash Functions’ Collision Resistance Emmanouel Kellinis1 and Konstantinos Papapanagiotou2 1 KPMG LLP, One Canada Square, London E14 5AG, United Kingdom [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:05:58
878Merkle–Damgård construction / Probability theory / Random oracle / Hash function / HMAC / Oracle machine / Collision resistance / Random function / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

Merkle Damgard Revisited: how to Construct a hash Function Jean-Sebastien Coron Yevgeniy Dodis Cecile Malinaud

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
879Cryptographic hash functions / Internet / Cryptographic protocols / Hashing / Error detection and correction / Steven M. Bellovin / Domain Name System Security Extensions / SHA-1 / MD5 / Cryptography / Computing / Internet protocols

Cryptographic Hash Workshop[removed]Deploying New Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:02:34
880Cryptographic hash functions / SHA-1 / Mathematics

Automated Search for Round 1 Differentials for SHA-1: Work in Progress Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-05 15:52:58
UPDATE