SHA-1

Results: 1300



#Item
941Giving / Pro bono / Pro se legal representation in the United States / Bono / Law / Philanthropy / United States law

Access to Justice Commission Local Pro Bono Committee-2nd Judicial District January – December 2011 Annual Report 1. Please provide a list of your committee members and their e-mail addresses. a. Chairperson(s): C. Sha

Add to Reading List

Source URL: www.nmbar.org

Language: English - Date: 2013-01-11 12:55:48
942Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
943Academia / Science / Mark P. Leone / Archaeological sub-disciplines / Historical archaeology / Archaeology

Contents Volume 46, No. 4, 2012 MEMORIAL RODERICK SPRAGUE 1933–2012 1

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-05-21 13:41:30
944Gerald F. Schroedl / Archaeology / Horning

Contents J. C. HARRINGTON AWARD 2002: CHARLES E. CLELAND JOHN L. COTTER AWARD 2001: AUDREY J. HORNING 1 10

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:16:59
945James Deetz / Paul A. Shackel

Contents J. C. HARRINGTON AWARD 2003: MERRICK POSNANSKY 1 JOHN L. COTTER AWARD 2003: TIMOTHY SCARLETT

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:16:59
946SHA-1 / Crypt / VEST / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:45:52
947SHA-1 / Cryptography / Abstraction / Security / Computer security / Password cracking / Cryptographic hash functions / Password / Crypt

CALIFORNIA STATE SCIENCE FAIR 2013 PROJECT SUMMARY Name(s) Sohil Bammi; Brandon Betkolia; Eric Zhou

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2013-04-13 17:38:40
948Transportation in Maryland / Urban studies and planning / Transportation in New Jersey / Transportation planning / Transport / Maryland Department of Transportation

2014 STIP SECTION 1 APPENDIX A Statement of Self-Certification As MDOT oversees its modal agencies, there is close coordination in all aspects of project delivery. For the purposes of Self-Certification, SHA and MTA sub

Add to Reading List

Source URL: www.mdot.maryland.gov

Language: English
949Nicholas Honerkamp / Community archaeology / Mark P. Leone / Bioarchaeology / Archaeology / Archaeological sub-disciplines / Cultural heritage

Contents J. C. HARRINGTON AWARD 2005: MARCEL MOUSSETTE 1

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:16:59
950SHA-2 / Hash function / Exclusive or / Grøstl / GOST / SHA-1 / Error detection and correction / Cryptographic hash functions / Cryptography

OFFICIAL COMMENT: Grostl 1 of 1 Subject: OFFICIAL COMMENT: Grostl From: "Søren S. Thomsen"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-30 01:00:00
UPDATE