51![sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including](https://www.pdfsearch.io/img/3b63d64bdb28b980ea72779694cb3e19.jpg) | Add to Reading ListSource URL: www.bolet.orgLanguage: English - Date: 2015-09-06 14:06:03
|
---|
52![A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha](https://www.pdfsearch.io/img/5a7e2a09a300448c6cc8245a9defb7c4.jpg) | Add to Reading ListSource URL: webdocs.cs.ualberta.caLanguage: English - Date: 2009-10-06 18:16:29
|
---|
53![On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009 On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009](https://www.pdfsearch.io/img/d03cd8ad22925a36f4495304773fd912.jpg) | Add to Reading ListSource URL: digitalpiglet.orgLanguage: English - Date: 2009-11-27 08:30:51
|
---|
54![SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions](https://www.pdfsearch.io/img/49d0c5fdffb1a2ba7e14344c4e0f5f8f.jpg) | Add to Reading ListSource URL: nvlpubs.nist.govLanguage: English - Date: 2015-08-04 11:34:10
|
---|
55![FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY](https://www.pdfsearch.io/img/68230ac4937ce50c37e95de96fe42d23.jpg) | Add to Reading ListSource URL: nvlpubs.nist.govLanguage: English - Date: 2015-08-04 11:33:21
|
---|
56![Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f](https://www.pdfsearch.io/img/bf4926493960d5a04d2d44f27ded2fdc.jpg) | Add to Reading ListSource URL: www.cs.princeton.eduLanguage: English - Date: 2014-12-23 10:16:22
|
---|
57![Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep](https://www.pdfsearch.io/img/24f2e8a015c864fc31222559e0cd2132.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
58![On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP](https://www.pdfsearch.io/img/a1d28b8406c177d07c6251b379c70164.jpg) | Add to Reading ListSource URL: ice.mat.dtu.dkLanguage: English - Date: 2013-06-10 04:26:41
|
---|
59![SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: -](https://www.pdfsearch.io/img/be23e49d4727d17e6b10f944700c2309.jpg) | Add to Reading ListSource URL: casecurity.orgLanguage: English - Date: 2015-06-08 11:59:43
|
---|
60![Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection](https://www.pdfsearch.io/img/89f69c1321f06af1244e518800413a70.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-09-24 10:22:35
|
---|