31![FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections](https://www.pdfsearch.io/img/a8d68c367f0ef0bc995ce916f15d13ea.jpg) | Add to Reading ListSource URL: www.atsec.comLanguage: English - Date: 2015-12-09 15:15:24
|
---|
32![Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland](https://www.pdfsearch.io/img/c779042332fd89aed5cdfd0c69b1ed90.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2008-07-21 05:29:13
|
---|
33![yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision: yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:](https://www.pdfsearch.io/img/f5c558a5ee9dbf779a02eb5dc07c0709.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2015-10-25 04:56:20
|
---|
34![A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha](https://www.pdfsearch.io/img/9c10f01ff0c7aa83e84adf1acda4e583.jpg) | Add to Reading ListSource URL: webdocs.cs.ualberta.caLanguage: English - Date: 2009-10-06 18:16:29
|
---|
35![Digital Library 2.0 for Educational Resources Monika Akbar1 , Weiguo Fan1 , Clifford A. Shaffer1 , Yinlin Chen1 , Lillian Cassel2 , Lois Delcambre3 , Daniel D. Garcia4 , Gregory W. Hislop5 , Frank Shipman6 , Richard Fu Digital Library 2.0 for Educational Resources Monika Akbar1 , Weiguo Fan1 , Clifford A. Shaffer1 , Yinlin Chen1 , Lillian Cassel2 , Lois Delcambre3 , Daniel D. Garcia4 , Gregory W. Hislop5 , Frank Shipman6 , Richard Fu](https://www.pdfsearch.io/img/15900835befa0814d1bd6d4b189c33a9.jpg) | Add to Reading ListSource URL: www.cs.utep.eduLanguage: English - Date: 2011-10-12 16:36:05
|
---|
36![Parallel Steve Thomas (Steve at tobtu dot com)
Specification Symbols/functions ** Parallel Steve Thomas (Steve at tobtu dot com)
Specification Symbols/functions **](https://www.pdfsearch.io/img/ea3bf60c9f5157253a4d320247336bcc.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2015-02-03 09:25:05
|
---|
37![Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India](https://www.pdfsearch.io/img/18b0471ece8bfbdf8bfbb1e783df9981.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2014-10-16 08:19:35
|
---|
38![menu_SHA_2016_maijs_trim-2.pdf menu_SHA_2016_maijs_trim-2.pdf](https://www.pdfsearch.io/img/e109ca93bc87b415a20d9ea70ceee6bb.jpg) | Add to Reading ListSource URL: www.steikuhaoss.lvLanguage: Latvian - Date: 2016-05-03 15:18:02
|
---|
39![Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson1,∗ , Orr Dunkelman2,† , Sebastiaan Indesteege3,4,‡ , and Bart Preneel3,4 1 FHNW, Windisch, Switzerland. ´ Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson1,∗ , Orr Dunkelman2,† , Sebastiaan Indesteege3,4,‡ , and Bart Preneel3,4 1 FHNW, Windisch, Switzerland. ´](https://www.pdfsearch.io/img/f2a2eee1cbfc86562e7944be4610dc98.jpg) | Add to Reading ListSource URL: 131002.netLanguage: English - Date: 2012-08-14 06:46:39
|
---|
40![Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent](https://www.pdfsearch.io/img/b9f4616ed2c0797350b556ea5d27a297.jpg) | Add to Reading ListSource URL: mitls.orgLanguage: English - Date: 2016-01-06 07:34:05
|
---|