<--- Back to Details
First PageDocument Content
Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management
Cryptographic hash functions
Electronic commerce
Certificate policy
SHA-1
SHA-2
Digital signature
Public key certificate
Digital Signature Algorithm
SHA
Cryptography
Public-key cryptography
Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Download Document from Source Website

File Size: 1,49 MB

Share Document on Facebook

Similar Documents

Computer architecture / Cryptography / Computing / NIST hash function competition / Instruction set architectures / Cryptographic hash functions / Assembly languages / Grstl / ARM architecture / SHA-2 / 64-bit computing / Addressing mode

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

DocID: 1xVSa - View Document

Cryptography / Cryptographic hash functions / NIST hash function competition / Flynn's taxonomy / Parallel computing / SIMD / SHA-3 / Hash function / Block cipher / MerkleDamgrd construction / One-way compression function

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

DocID: 1xVB3 - View Document

Cryptography / Block ciphers / Advanced Encryption Standard / AES implementations / RSA / PRESENT / Symmetric-key algorithm / ECRYPT / ARIA / Data Encryption Standard / Key size / Poly1305

C:/Users/Ingo/Dropbox/Promotion/Studis/Stud_Schneider/paper/ga144_ieee.dvi

DocID: 1xT9R - View Document

PDF Document

DocID: 1xroN - View Document

PDF Document

DocID: 1wDkZ - View Document