SHA-1

Results: 1300



#Item
981Cryptographic hash function / Hash function / SHA-1 / Tiny Encryption Algorithm / Free60 / Homebrew / Cryptography / Xbox / Search algorithms

Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

Add to Reading List

Source URL: hackingthexbox.com

Language: English - Date: 2003-04-17 04:53:36
982Cryptographic hash functions / Electronic Signatures in Global and National Commerce Act / Electronic signature / Digital signature / RSA / Provable security / IEEE P1363 / SHA-1 / Cryptography / Public-key cryptography / CRYPTREC

Report on Present State of ESIGN Signature Evaluation (full evaluation) January 28, 2002 Yasuyuki Sakai, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
983Computing / Cryptographic hash functions / Hashing / SHA-2 / Bouncy Castle / HMAC / SHA-1 / IPsec / Secure Hash Standard / Cryptography / Cryptographic software / Error detection and correction

Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2014-05-14 07:46:41
984MD5 / SHA-1 / MD4 / Cryptography / Mathematics / Cryptographic hash functions

Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications Vlastimil Klima1, 2 [removed] http://cryptography.hyperlink.cz/ Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2005-03-31 08:43:00
985MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands [removed] January 29, 2012

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2012-01-29 17:12:55
986Computer security / Cryptographic hash functions / OpenSSL / Open Source Software Institute / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2007-02-06 16:03:20
987Cryptographic hash functions / Hashing / Advanced Encryption Standard / FIPS 140-2 / Cryptographic Module Validation Program / SHA-2 / OpenSSL / FIPS 140 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2012-06-26 20:45:21
988Cryptographic hash functions / Hashing / Advanced Encryption Standard / HMAC / SHA-2 / OpenSSL / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2010-12-08 14:19:25
989Error detection and correction / Cryptographic hash functions / Advanced Encryption Standard / OpenSSL / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2011-05-12 08:55:47
990Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Cryptographic hash functions / Open Source Software Institute / FIPS 140 / SHA-1 / Advanced Encryption Standard / AES implementations / Cryptography standards / Cryptography / Cryptographic software

PDF Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2008-02-10 13:28:55
UPDATE