First Page | Document Content | |
---|---|---|
![]() Date: 2016-05-26 13:27:36Cryptography Message authentication codes Cryptography standards Cryptographic software Cryptographic hash functions Hashing Digital Signature Algorithm FIPS 140-2 Dual EC DRBG OpenSSL SHA-2 Hash-based message authentication code | Add to Reading List |
![]() | Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptxDocID: 1qYFO - View Document |
![]() | FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.DocID: 1qHZI - View Document |
![]() | Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-ExupéryDocID: 1pTjt - View Document |
![]() | The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. PatDocID: 1oU0H - View Document |
![]() | Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) ConstructionsDocID: 1o3Yp - View Document |