First Page | Document Content | |
---|---|---|
![]() Date: 2010-09-28 09:14:27Hashing Message authentication codes Cryptographic hash function Key size FIPS 140-2 SHA-2 Symmetric-key algorithm Key generation SHA-1 Cryptography Key management Cryptography standards | Add to Reading List |