Security experts vying to have their technology selected as the next cryptographic-hash algorithm standard for the U.S. government need to submit their entries this week. Then they will have a long ...
Bringing to a close a five-year selection process, the U.S. National Institute of Standards and Technology (NIST) has selected the successor to the encryption algorithm that is used today to secure ...
The National Institute of Standards and Technology today announced a public competition to pick a new cryptographic hash algorithm that would become the new federal information processing standard.
At the Crypto 2004 conference in Santa Barbara, Calif., this week, researchers announced several weaknesses in common hash functions. These results, while mathematically significant, aren’t cause for ...
PGP Corporation is planning to migrate to a more secure version of the Secure Hash Algorithm (SHA) in the upcoming releases of its PGP Desktop and PGP Universal encryption solutions. According to a ...
Last year was a bad year for the Secure Hash Algorithm. This year has been worse. A key technology used in digitally signing documents and programs, the Secure Hash Algorithm, or SHA, is used by U.S.
The National Institute of Standards and Technology (NIST) today announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern ...