SHA-1

Results: 1300



#Item
891PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
892FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / SHA-1 / Cryptographic hash function / FIPS 140-3 / IBM / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - ISS GX 4-3 Series FIPS 140 Security Policy v1-6-LegacyGX.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-06 11:54:54
893Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
894Cryptographic hash functions / Key management / X.509 / Digital signature / Validation / SHA-2 / SHA-1 / Cambridge Rindge and Latin School / Cryptography / Public-key cryptography / Cryptographic protocols

Path Validation Testing NIST Recom m endation for X.509 Path Validation David Cooper M ay 19, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
895SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
896Computing / Software / Cryptographic hash functions / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / SHA-2 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-14 15:12:00
897RAID / ZFS / SHA-2 / Nexenta OS / SHA-1 / Checksum / File system / Solid-state drive / Computer architecture / Cryptographic hash functions / Computing / Disk file systems

ZFS on SMR Drives Enabling Shingled Magnetic Recording (SMR) for Enterprises ROBERT E. NOVAK |

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:51:22
898Search algorithms / Collision resistance / Hash function / Digital signature / Universal one-way hash function / SHA-1 / Collision attack / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:38:38
899Hashing / Search algorithms / Hash function / Preimage attack / Collision attack / SHA-1 / SHA-2 / Padding / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
900

SHA-1: Practical Security Implications of Continued Use

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2012-06-20 08:19:58
    UPDATE