SHA-2

Results: 893



#Item
751Internet protocols / Cryptographic software / FIPS 140-2 / Password / HMAC / FIPS 140 / PKCS / IPsec / SHA-1 / Cryptography / Cryptography standards / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-02 16:29:20
752Digital signature / Public-key cryptography / Key / SHA-2 / NSA Suite B Cryptography / CRYPTREC / Cryptography / Cryptographic software / Key management

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:23
753Cryptographic hash functions / Key management / Time / Code signing / Public key certificate / Timestamp / SHA-2 / SHA-1 / PKCS / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-06-13 14:10:10
754Serial Peripheral Interface Bus / Skein / Keccak / Field-programmable gate array / Acer Laboratories Incorporated / SHA-2 / Voltage-controlled oscillator / Electronic engineering / NIST hash function competition / Electronics

© 2011 Center for Embedded Systems for Critical Applications NIST SHA-3 ASIC Datasheet -- NIST SHA-3 Competition Five Finalists on a Chip (Version 1.1)

Add to Reading List

Source URL: rijndael.ece.vt.edu

Language: English - Date: 2011-11-29 16:40:20
755Sha / Computing / Cryptographic hash functions / SHA-2 / SHA-1

Release Notes: DTrade v.3.0 November 22, 2013 Contents This document provides specific information for the release of DTrade v.3.0.

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-21 16:15:48
756Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
757NIST hash function competition / Hashing / SHA-1 / SHA-2 / Keccak / Skein / Cryptanalysis / Joan Daemen / Hash list / Error detection and correction / Cryptographic hash functions / Cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:55:35
758SHA-1 / NIST hash function competition / SHA-2 / Keccak / Grøstl / ECRYPT / Crypt / RIPEMD / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information Society Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:34:52
759Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / ARIA / Grøstl / SHA-2 / Galois/Counter Mode / NIST hash function competition / Cryptography / Cryptographic hash functions / Whirlpool

Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob Markku-Juhani O. Saarinen Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-07-16 03:56:34
760MD4 / MD5 / Collision attack / RIPEMD / Venti / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:46:28
UPDATE