SHA-2

Results: 893



#Item
1

2 A MESSAGE FROM THE STATE HIGHWAY ADMINISTRATION (SHA) The State Highway Administration is pleased to present this latest edition of the Maryland Motor Carrier Handbook. The handbook is intended to

Add to Reading List

Source URL: marylandroads.com

Language: English - Date: 2018-06-04 07:41:58
    2

    Freestart collision for full SHA-1 Marc Stevens1? , Pierre Karpman2,3?? , and Thomas Peyrin3? ? ? 1 Centrum Wiskunde & Informatica, The Netherlands 2

    Add to Reading List

    Source URL: marc-stevens.nl

    - Date: 2017-08-13 07:48:58
      3

      Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman1,2? , Thomas Peyrin2?? , and Marc Stevens3 1 Inria, France

      Add to Reading List

      Source URL: marc-stevens.nl

      - Date: 2017-08-13 07:48:58
        4

        Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

        Add to Reading List

        Source URL: people.csail.mit.edu

        - Date: 2005-06-01 07:41:33
          5

          平成 28 年 12 月 7 日 岡藤商事株式会社 コールセンター インターネット取引「Expert」 サーバ証明書の「SHA-2」方式への切替実施について

          Add to Reading List

          Source URL: www.okato.co.jp

          - Date: 2016-12-07 00:54:51
            6

            SHA-2 will soon retire The SHA-3 Song Michael Naehrig Christiane Peters

            Add to Reading List

            Source URL: www.anagram.com

            - Date: 2010-11-11 14:43:46
              7

              Comprehensive Comparison of Hardware Performance of Fourteen Round 2 SHA-3 Candidates with 512-bit Outputs Using Field Programmable Gate Arrays Kris Gaj,

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2012-05-30 14:38:26
                8Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

                GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

                Add to Reading List

                Source URL: www.cryptophone.de

                Language: English - Date: 2009-10-21 09:08:30
                9Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

                The Politics of Cryptography: Bitcoin and The Ordering Machines

                Add to Reading List

                Source URL: iqdupont.com

                Language: English - Date: 2015-12-03 10:50:31
                UPDATE