SHA-2

Results: 893



#Item
571System software / Trusted computing / Trusted Platform Module / Unified Extensible Firmware Interface / Trusted Computing Group / Personal computer hardware / SHA-1 / Computer security / BIOS / Computing

presented by Evolving Hardware-Based Security: Firmware Transition to TPM 2.0 UEFI Summerfest – July 15-19, 2013 Dick Wilkins, Ph.D.

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 13:40:23
572Sha / Law / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

[removed]version Louisiana Tumor Registry Data Release Policies I. Aggregated Data 1. Definition: Combines information from multiple cases. 2. Requirement:

Add to Reading List

Source URL: louisianatumorregistry.lsuhsc.edu

Language: English - Date: 2013-10-30 12:12:38
573SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-06-27 13:16:19
574Classical genetics / Genetic genealogy / Haplotype / Linkage disequilibrium / Transmission disequilibrium test / Genetics / Population genetics / Biology

Haplotype Sharing Transmission/Disequilibrium Tests That Allow for Genotyping Errors 1 Qiuying Sha, 1 Jianping Dong, 1 Renfang Jiang, 1 Huann-Sheng Chen, 1,2,∗

Add to Reading List

Source URL: www.math.mtu.edu

Language: English - Date: 2004-09-03 01:55:05
575Pavement management / Road surface / PMS / Pavement management system / Roads / Premenstrual syndrome

GENERAL OVERVIEW Pavement Management Program Questionnaire 1. Where in the State Highway Agency (SHA) is the Pavement Management System (PMS) Unit located? 2. What is the primary role of the PMS in the State highway prog

Add to Reading List

Source URL: www.fhwa.dot.gov

Language: English - Date: 2002-09-05 14:35:08
576Cryptographic software / Elliptic Curve DSA / SHA / Key size / Cryptography standards / NSA Suite B Cryptography / SHA-2 / Cryptography / Cryptographic hash functions / SHA-1

Legend for Description Field for Historical FIPS[removed]ECDSA Signature Generation Component Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-08 12:26:15
577NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
578SHA-2

SADDLEBROOKE GENEALOGYCLUB BYLAWS The name of dlis oa anizarion sh

Add to Reading List

Source URL: www.sb-genealogy.org

Language: English - Date: 2014-04-11 18:48:34
    579Cryptographic hash functions / SHA-2 / Kentucky Route 9 / CTC / Road surface / Highway / Transport / Road transport / Land transport

    CTC PROJECT ALLOCATION LIST – MAY 2014 Project # Allocation Amount Recipient RTPA/CTC County

    Add to Reading List

    Source URL: www.caltrans.ca.gov

    Language: English - Date: 2014-05-22 13:27:43
    580Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

    The Key Agreement Schemes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-04-23 12:28:29
    UPDATE