SHA-2

Results: 893



#Item
701SHA-2 / SHA-1 / Crypt / Hash function / Transport Layer Security / Error detection and correction / Cryptographic hash functions / Cryptography

The Secure Hash Algorithm Validation System (SHAVS) Updated: May 21, 2014 Created: July 22, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-21 09:13:37
702Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:54:42
703Data Encryption Standard / Advanced Encryption Standard / SHA-2 / FIPS 140-2 / SHA-1 / Key Wrap / Symmetric-key algorithm / Key size / Block cipher / Cryptography / Cryptography standards / Cryptographic hash functions

DISCUSSION PAPER: The Transitioning of Cryptographic Algorithms and Key Sizes 1 Background and Purpose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:50:36
704Cryptography / Hashing / Checksum / Cksum / MD5 / Hash function / File verification / SHA-2 / Sum / Computing / Cryptographic hash functions / Software

Checksum Programs Evaluation Summary Being able to verify that a file has not changed overtime at the bit level can be done by creating and monitoring the fixity of a file. Fixity can be generated on the server side, and

Add to Reading List

Source URL: www.mnhs.org

Language: English - Date: 2014-04-22 17:26:10
705Cryptographic hash functions / FIPS 140-2 / HMAC / FIPS 140 / SHA-1 / Advanced Encryption Standard / Crypto++ / CryptGenRandom / Cryptography / Cryptography standards / Cryptographic software

SBGSE1_SecurityPolicyPalm-_9-30-03_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
706Public-key cryptography / Preimage attack / Hash function / Digital Signature Algorithm / Collision / Digital signature / Crypt / Collision attack / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

NIST SP[removed], Randomized Hashing for Digital Signatures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:45:25
707Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-17 01:00:00
708Cryptographic hash functions / FIPS 140 / SHA-2 / Authentication / SHA-1 / Crypto++ / Cryptography / Cryptography standards / Computer security

Microsoft Word[removed]Sony_Gemini_v2-Security Policy_v103_20140324.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-23 13:28:41
709Computer security / Windows CE / Windows Mobile / FIPS 140-2 / Windows XP / HMAC / Pocket PC / FIPS 140 / SHA-2 / Cryptography standards / Cryptography / Computing

Mobile Armor Mobile Armorâ„¢ Warp Drive[removed]Security Policy FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
710Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / HMAC / Block cipher / Key size / SHA-1 / Symmetric-key algorithm / Padding / Cryptography / Cryptographic hash functions / Hashing

Cryptolite Security Policy-o.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE