SHA-1

Results: 1300



#Item
81BYLAWS OF THE PALM SPRINGS, CALIFORNIA, BRANCH OF THE AMERICAN  ASSOCIATION OF UNIVERSITY WOMEN (AAUW) ARTICLE I.  NAME AND GOVERNANCE  Section 1.   Name.  The name of this organization sha

BYLAWS OF THE PALM SPRINGS, CALIFORNIA, BRANCH OF THE AMERICAN  ASSOCIATION OF UNIVERSITY WOMEN (AAUW) ARTICLE I.  NAME AND GOVERNANCE  Section 1.   Name.  The name of this organization sha

Add to Reading List

Source URL: palmsprings-ca.aauw.net

Language: English - Date: 2015-06-06 20:49:56
    82NEM  Technical Reference Version 1.0  May 15, 2015

    NEM Technical Reference Version 1.0 May 15, 2015

    Add to Reading List

    Source URL: nem.io

    Language: English - Date: 2015-05-25 20:17:43
    83On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    Add to Reading List

    Source URL: ice.mat.dtu.dk

    Language: English - Date: 2013-06-10 04:26:41
      84SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: -

      SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: -

      Add to Reading List

      Source URL: casecurity.org

      Language: English - Date: 2015-06-08 11:59:43
        85

        WSFS – Standing Rules Standing Rules for the Governance of the World Science Fiction Society Business Meeting Group 1: Meetings Rule 1.1: Meeting and Session. The Annual Meeting of the World Science Fiction Society sha

        Add to Reading List

        Source URL: wsfs.org

        Language: English - Date: 2013-01-31 02:41:14
          86Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

          Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-09-24 10:22:35
          87Software Speed Records for Lattice-Based Signatures Tim G¨ uneysu1 , Tobias Oder1 , Thomas P¨oppelmann1 , and Peter Schwabe2 1 2

          Software Speed Records for Lattice-Based Signatures Tim G¨ uneysu1 , Tobias Oder1 , Thomas P¨oppelmann1 , and Peter Schwabe2 1 2

          Add to Reading List

          Source URL: www.sha.rub.de

          Language: English - Date: 2013-04-03 04:15:43
            88A Collision for 70-step SHA-1 in a Minute

            A Collision for 70-step SHA-1 in a Minute

            Add to Reading List

            Source URL: fse2007.uni.lu

            Language: English - Date: 2007-05-23 09:26:00
              89PolarSSLverification kit V1.0 Evaluation version –

              PolarSSLverification kit V1.0 Evaluation version –

              Add to Reading List

              Source URL: trust-in-soft.com

              Language: English - Date: 2015-09-11 09:21:10
              901  ]n¶m¡ kap-Zmb hnI-k\ hIp¸vv Ub-d-IvS-dpsS Imcym-ebw A¿-³Imfn `h³ þ \memw \ne, I\-I-\-KÀ, shÅ-b-¼-ew, Xncp-h-\-´-]pcw þ t^m¬/^mIvkv þ , email :  Website : www.b

              1 ]n¶m¡ kap-Zmb hnI-k\ hIp¸vv Ub-d-IvS-dpsS Imcym-ebw A¿-³Imfn `h³ þ \memw \ne, I\-I-\-KÀ, shÅ-b-¼-ew, Xncp-h-\-´-]pcw þ t^m¬/^mIvkv þ , email : Website : www.b

              Add to Reading List

              Source URL: scholarship.itschool.gov.in

              Language: English - Date: 2015-10-05 01:52:54