<--- Back to Details
First PageDocument Content
Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography
Date: 2012-05-30 12:35:44
Cryptographic hash functions
SHA-1
Keccak
Skein
BLAKE
Secure Hash Standard
CubeHash
Vlastimil Klíma
SIMD
NIST hash function competition
Error detection and correction
Cryptography

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 353,14 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / Error detection and correction / Hashing / NIST hash function competition / Secure Hash Algorithms / SHA-3 / SHA-1 / Crypt / SHA-2

Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

DocID: 1xVjQ - View Document

Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

DocID: 1rud6 - View Document

Cryptography standards / Cryptographic hash functions / Cryptography / FIPS 140-2 / FIPS 140 / SHA-2 / SHA-1 / Cryptographic Module Validation Program / Advanced Encryption Standard / Secure Hash Algorithm / Data Encryption Standard

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

DocID: 1oV1V - View Document

Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

DocID: 1lKRk - View Document

Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

DocID: 1lHQo - View Document