SHA-2

Results: 893



#Item
161Cryptography / Keccak / Advanced Encryption Standard / JH / SHA-2 / 64-bit / Grøstl / Addressing mode / Bitwise operation / NIST hash function competition / Computer architecture / Computing

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 23:11:17
162Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Language: English
163Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
164Cyberwarfare / Computer security / Rainbow table / Password / SHA-2 / Crypt / Hash function / Password strength / Salt / Cryptography / Cryptographic hash functions / Search algorithms

CIS 331 Introduction to Networks & Security February 10, 2015 Homework 3: Passwords

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-10 00:30:21
165Transport in Hong Kong / MTR Corporation / Kowloon–Canton Railway / KCRC / Sha Tin to Central Link / Ma On Shan Line / Citylink Plaza / West Rail Line / Kowloon Southern Link / Hong Kong / MTR / Kowloon–Canton Railway Corporation

KOWLOON-CANTON RAILWAY CORPORATION Chairman’s Statement 2

Add to Reading List

Source URL: www.kcrc.com.hk

Language: English - Date: 2014-08-13 05:32:08
166Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP RevisionregardingStep 4.doc

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
167Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
168Pets / Schismatogobius insignus / Redneck goby / Fish anatomy / Personal life / Schismatogobius / Schismatogobius fuligimentus / Fish

Zoological Studies 40(2): Schismatogobius fuligimentus, a New Species of Freshwater Goby (Teleostei: Gobiidae) from New Caledonia I-Shiung Chen1, Bernard Séret2, Christine Pöllabauer3 and Kwang-Tsao Sha

Add to Reading List

Source URL: fishdb.sinica.edu.tw

Language: English - Date: 2014-04-07 04:59:47
169Message authentication codes / Hashing / Hash function / MD5 / SHA-1 / Block cipher / Collision resistance / One-way compression function / CBC-MAC / Cryptography / Error detection and correction / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
170Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2007 Assignment #2 Due: Friday, Feb. 23, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-17 22:43:38
UPDATE