SHA-1

Results: 1300



#Item
911Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
912Cryptographic hash functions / Advanced Encryption Standard / Internet protocols / Cryptographic software / IPsec / Internet Key Exchange / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptographic protocols

Microsoft Word - 626g - S6000 Security Policy 2.9.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:31:34
913System software / Trusted computing / Trusted Platform Module / Unified Extensible Firmware Interface / Trusted Computing Group / Personal computer hardware / SHA-1 / Computer security / BIOS / Computing

presented by Evolving Hardware-Based Security: Firmware Transition to TPM 2.0 UEFI Summerfest – July 15-19, 2013 Dick Wilkins, Ph.D.

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 13:40:23
914Electronic commerce / Cryptographic protocols / Cryptographic hash functions / MD5 / X.509 / SHA-1 / Public key certificate / Certificate authority / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Exploiting weaknesses in the MD5 hash algorithm to subvert security on the Web

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:52:09
915Sha / Law / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

[removed]version Louisiana Tumor Registry Data Release Policies I. Aggregated Data 1. Definition: Combines information from multiple cases. 2. Requirement:

Add to Reading List

Source URL: louisianatumorregistry.lsuhsc.edu

Language: English - Date: 2013-10-30 12:12:38
916SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-06-27 13:16:19
917Classical genetics / Genetic genealogy / Haplotype / Linkage disequilibrium / Transmission disequilibrium test / Genetics / Population genetics / Biology

Haplotype Sharing Transmission/Disequilibrium Tests That Allow for Genotyping Errors 1 Qiuying Sha, 1 Jianping Dong, 1 Renfang Jiang, 1 Huann-Sheng Chen, 1,2,∗

Add to Reading List

Source URL: www.math.mtu.edu

Language: English - Date: 2004-09-03 01:55:05
918Pavement management / Road surface / PMS / Pavement management system / Roads / Premenstrual syndrome

GENERAL OVERVIEW Pavement Management Program Questionnaire 1. Where in the State Highway Agency (SHA) is the Pavement Management System (PMS) Unit located? 2. What is the primary role of the PMS in the State highway prog

Add to Reading List

Source URL: www.fhwa.dot.gov

Language: English - Date: 2002-09-05 14:35:08
919Cryptographic software / Elliptic Curve DSA / SHA / Key size / Cryptography standards / NSA Suite B Cryptography / SHA-2 / Cryptography / Cryptographic hash functions / SHA-1

Legend for Description Field for Historical FIPS[removed]ECDSA Signature Generation Component Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-08 12:26:15
920Search algorithms / Hash functions / MD5 / SHA-1 / Rolling hash / Error detection and correction / Hashing / Cryptographic hash functions

ManTech SMA Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:18
UPDATE