SHA hash functions

related topics
{math, number, function}
{system, computer, user}
{work, book, publish}
{style, bgcolor, rowspan}
{war, force, army}
{law, state, case}
{specie, animal, plant}
{car, race, vehicle}

The Secure Hash Algorithm is one of a number of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard:

The corresponding standards have been FIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512), FIPS PUB 180-3 (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512).

Full article ▸

related documents
Arithmetic coding
Advanced Encryption Standard
Cyclic redundancy check
Uniform Resource Identifier
Aspect-oriented programming
White noise
Database normalization
Objective Caml
IEEE 754-1985
Exclusive or
Key size
Ideal class group
Elliptic curve
Gaussian quadrature
Natural transformation
Linear combination
Algebraic structure
Absolute convergence
Partition (number theory)
E (mathematical constant)
Abstract interpretation
Galois theory
Random variable
Complex analysis
Binary relation
Countable set