SHA-2

Results: 893



#Item
611Cultural heritage / Public archaeology / Archaeology / Archaeological sub-disciplines / Community archaeology

Syllabus: ANTH 4394: Public Archaeology Spring 2005 Room 122 McElhinney Building 2:30 – 4:00 pm TTH Instructor: Carol McDavid, Ph.D. Office hours: by prior appointment

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:20:25
612Computing / Hash function / SHA-2 / MD5 / Hash list / Computer programming / Information retrieval / Cryptographic hash functions / Hashing / Error detection and correction

The need for large-scale biometric testing

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-08-10 15:11:32
613Anthropology / Archaeology / Archaeological sub-disciplines

HISTORICAL ARCHAEOLOGY ANTHROPOLOGY/HISTORY 266:01 (Writing Intensive) Dr. Richard Veit Spring 2009 Class Meets: M, TH 1:00-2:15

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:19:26
614Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
615Set animal / Cryptographic hash functions / SHA-2 / Sha

Class of 2014 Application To Apply: Complete the application form on Page 2 Include:

Add to Reading List

Source URL: developinghistoryleaderssha.files.wordpress.com

Language: English - Date: 2014-02-13 15:24:51
616Goodwin / Ichabod / Spencer

Old Fields Archaeological Dig Update  Conference for Northeast Historical Archaeology Newsletter February 2, 2014  Neill De Paoli Since 2010, Neill De Paoli has directed archaeological investigatio

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-05-19 13:33:58
617Voluntary Voting System Guidelines / FIPS 140-2 / FIPS 140 / Computing / Politics / Electronic voting / SHA-2 / Technical Guidelines Development Committee / Cryptography / Cryptography standards / Election technology / Computer security

Derived Test Requirements for the Updated Cryptography Requirements in the VVSG Version 1.1 Version 1.1 July 15, 2009 Preliminary Draft

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-03-25 11:34:24
618SHA-2 / SHA-1 / Advanced Encryption Standard / Cryptographic nonce / Hash function / Cryptography / Cryptographic hash functions / Pseudorandom number generators

The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-14 13:50:49
619Cryptographic hash functions / Finite fields / Cryptography standards / SHA-2 / Key generation / HMAC / SHA-1 / Key Wrap / Galois/Counter Mode / Cryptography / Message authentication codes / Cryptographic software

Frequently Asked Questions For the Cryptographic Algorithm Validation Program Concerning the Validation of Cryptographic Algorithm Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 16:11:18
620Computing / Domain Name System Security Extensions / Hardware security module / Domain name / ICANN / Verisign / Root name server / FIPS 140-2 / SHA-2 / Domain name system / Cryptography / Internet

October 29, 2009 Testing and Implementation Requirements for the Initial Deployment of DNSSEC in the Authoritative Root Zone Introduction and Baseline Architecture

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2011-07-06 14:14:42
UPDATE