Secure Hash Standard

Results: 51



#Item
31Bouncy Castle FIPS Java API  4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2014-05-14 07:46:41
32mstockstill on PROD1PC70 with NOTICES  Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
33Comments Received on Special Publication 800-90A, B and C

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
34NIST Cryptographic Standards and Guidelines Development Program Briefing Book

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
35ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
36FIPS 180-4, Secure Hash Standard (SHS)

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
37Microsoft PowerPoint - preneel_mmm10v1.ppt

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
38Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:00
39Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:17
40DRAFT FIPS 202, SHA-3 Standard:  Permutation-Based Hash and Extendable-Output Functions

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39