SHA-2

Results: 893



#Item
41Cryptography / Cryptography standards / Cryptographic software / Computing / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / SHA-2

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-05-11 21:52:06
42Cryptography / Cryptographic hash functions / Search algorithms / Key management / Hashing / Scrypt / Salt / Password / Hash function / Crypt / Key derivation function / SHA-2

TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:39:48
43

【ハッシュアルゴリズム「SHA-1」から「SHA-2」への移行に関するお知らせ】 Web サーバのデータの改ざんを検知するハッシュアルゴリズム「SHA-1」SSL サーバ証明書に

Add to Reading List

Source URL: yoyaku.cultos-y.jp

- Date: 2016-02-27 05:25:33
    44Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2016-04-29 19:57:45
    45Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English
    46

    menu_SHA_2016_maijs_trim-2.pdf

    Add to Reading List

    Source URL: www.steikuhaoss.lv

    Language: Latvian - Date: 2016-05-03 15:22:00
      47SHA-2

      ØÂЃ (Schvrch) Ðàäå Âó÷êîâàö (Rade Vuckovac, ) 18th February

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:33:59
        48

        Freestart collision for full SHA-1] Marc Stevens1 o , Pierre Karpman2,3,4 f , and Thomas Peyrin4 b 1 Centrum Wiskunde & Informatica, The Netherlands 2

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-02-22 06:11:55
          49Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

          Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

          Add to Reading List

          Source URL: www.mitls.org

          Language: English - Date: 2016-01-06 07:34:05
          UPDATE