SHA-2

Results: 893



#Item
131Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
132PW / SHA-1 / .pw

EXPLOITING A SHA1 WEAKNESS IN PASSWORD CRACKING About me 2

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-11-30 07:12:16
133Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
134Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
135Cryptography / Applied mathematics / Crypt / Field-programmable gate array / Key derivation function / Password / Salt / MD5 / SHA-2 / Cryptographic hash functions / Mathematics / Key management

PRINCE modern password guessing algorithm Why do we need a new attack-mode? FUTURE OF PASSWORD HASHES

Add to Reading List

Source URL: hashcat.net

Language: English - Date: 2014-12-08 07:12:08
136

* Date: Saturday 22nd November 2014 Time: 10:00am—2:00pm Distance: 13.6KM Start/End point: Sha Tin Park Sign up now at our Facebook page (QR code)

Add to Reading List

Source URL: wp.cedars.hku.hk

- Date: 2014-11-06 03:15:04
    137Cryptographic software / OpenSSL / SHA-2 / C / D / Computing / Computer programming / Software engineering

    LibreSSL Giovanni Bechis Universit´a degli studi di Udine, Nov 29, 2014

    Add to Reading List

    Source URL: www.snb.it

    Language: English - Date: 2014-11-29 12:45:40
    138Economic history / Socioeconomics / Crisis / Financial crisis / Late-2000s financial crisis / SHA-2 / Economics / Economic bubbles / Financial crises

    The Financial Bubble Experiment: Advanced Diagnostics and Forecasts of Bubble Terminations Volume III R. Woodard, D. Sornette, J. Berninger (The Financial Crisis Observatory)∗ Department of Management, Technology and E

    Add to Reading List

    Source URL: www.er.ethz.ch

    Language: English - Date: 2011-05-03 11:07:32
    139Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

    Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    140Secure communication / Internet protocols / Cryptographic protocols / System software / Internet standards / Transport Layer Security / Cipher suite / OpenSSL / SHA-2 / Software / Cryptographic software / Computing

    SSLデフォルト設定の調査 - サーバ編 - 付録1 Cipher Suite

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2014-08-05 01:02:35
    UPDATE