First Page | Document Content | |
---|---|---|
![]() Date: 2016-07-29 15:19:10Cryptography standards Cryptographic hash functions Cryptographic software Hashing Block cipher mode of operation SHA-2 Advanced Encryption Standard Hash-based message authentication code FIPS 140-2 Key Wrap SHA-1 Cryptographic Module Validation Program | Add to Reading List |