- Home
- » Tags
- » Secure Hash Algorithms
Top View
- Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
- Chapter 4 Cryptographic Hash Functions Hash Function
- Analyses, Mitigation and Applications of Secure Hash Algorithms.Pdf
- The Evolution of Secure Hash Algorithms
- Comparative Analysis of Secured Hash Algorithms for Blockchain Technology and Internet of Things
- 97 Secure Hash Algorithms and the Corresponding FPGA Optimization
- FIPS 180-2, Secure Hash Standard (Superseded Feb. 25, 2004)
- Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
- Application-Specific Key Management Guidance
- Security of Hard Disk Encryption
- The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
- Analysis of SHA-3 Candidates Cubehash and Keccak
- Comparative Analysis of Cryptographic Hash Functions
- Security Based Approach of SHA 384 and SHA 512 Algorithms in Cloud Environment
- Ccsds Cryptographic Algorithms
- Ccsds Cryptographic Algorithms
- Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
- Why Now Is a Good Time to Secure Your Embedded Systems with SHA-3
- OSHA: a General-Purpose One-Way Secure Hash Algorithm
- D2.2 Second Report on New QR Cryptographic Primitives
- Junos Cryptographic Security Policy
- Chapter 1 Introduction to Cryptography
- Hashing for Message Authentication
- Design & Validation of BLAKE 256 IP Core
- Design, Implementation and Analysis of Keyed Hash Functions Based on Chaotic Maps and Neural Networks Nabil Abdoun
- Public-Key Cryptography and Message Authentication
- Design of an HMAC Co-Processor Unit Based on SHA-2 Family of Hash Functions
- Recommendation for Applications Using Approved Hash Algorithms
- The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
- Implementation of Sha-3 for Security and Error Detection and Correction Mechanism to Enhance Memory Reliabilty
- Low Power FPGA Implementations of 256-Bit Luffa Hash Function Paris Kitsos Nicolas Sklavos Athanassios N
- Hashing and Message Authentication Code Implementation. an Embedded Approach to Cite This Article: M
- View Datasheet
- A Secure Hash Function MD-192 with Modified Message Expansion
- CO ˚˜fl¨ˇ˚¯ P`E›N`G S˚I˜Bfle¨Lˇi˚U¯S } Preface
- Cryptographic Hash Functions: Cryptanalysis, Design and Applications
- ETSI TS 102 176-1 V2.0.0 (2007-11) Technical Specification
- Hardware Performance Evaluation of SHA-3 Candidate Algorithms
- CRYPTOGRAPHIC ALGORITHMS for UNCLASSIFIED, PROTECTED A, and PROTECTED B INFORMATION ITSP.40.111 August 2016