First Page | Document Content | |
---|---|---|
Date: 2012-05-30 12:35:44Cryptographic hash functions SHA-1 Keccak Skein BLAKE Secure Hash Standard CubeHash Vlastimil Klíma SIMD NIST hash function competition Error detection and correction Cryptography | Add to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 353,14 KBShare Document on Facebook |
Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash StandardDocID: 1xVjQ - View Document | |
GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface withDocID: 1rud6 - View Document | |
Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00DocID: 1oV1V - View Document | |
SHA-3 Standard: Permutation-Based Hash and Extendable-Output FunctionsDocID: 1lKRk - View Document | |
FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITYDocID: 1lHQo - View Document |