HMAC

Results: 319



#Item
191Concrete / Architecture / Chemistry / Asphalt concrete / Sieve analysis / Road surface / Construction aggregate / Emulsion / Aggregate / Construction / Building materials / Pavements

HMAC TEST PROCEDURES CITED IN:

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-05-04 19:50:26
192Cryptographic hash functions / Finite fields / Cryptography standards / SHA-2 / Key generation / HMAC / SHA-1 / Key Wrap / Galois/Counter Mode / Cryptography / Message authentication codes / Cryptographic software

Frequently Asked Questions For the Cryptographic Algorithm Validation Program Concerning the Validation of Cryptographic Algorithm Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 16:11:18
193Architecture / Concrete / Chemistry / Masonry / Asphalt concrete / Road surface / Construction aggregate / Emulsion / Sieve analysis / Construction / Building materials / Pavements

HMAC TEST PROCEDURES CITED IN:

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-05-04 19:50:32
194American FactFinder / United States Census Bureau / HMAC

Microsoft Word - Document2

Add to Reading List

Source URL: www.mcoaonline.com

Language: English - Date: 2013-06-18 14:53:40
195Architecture / Concrete / Chemistry / Masonry / Asphalt concrete / Road surface / Construction aggregate / Emulsion / Sieve analysis / Construction / Building materials / Pavements

HMAC TEST PROCEDURES CITED IN:

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2013-04-15 15:58:35
196Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
197

Microsoft Word - FINAL - HMAC -Guidance notes to companies on Hearings 2013.doc

Add to Reading List

Source URL: www.mhra.gov.uk

Language: English - Date: 2014-02-07 12:27:27
    198Computing / Cryptographic hash functions / Hashing / SHA-2 / Bouncy Castle / HMAC / SHA-1 / IPsec / Secure Hash Standard / Cryptography / Cryptographic software / Error detection and correction

    Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2014-05-14 07:46:41
    199Cryptographic hash functions / Hashing / Advanced Encryption Standard / HMAC / SHA-2 / OpenSSL / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

    PDF Document

    Add to Reading List

    Source URL: www.openssl.org

    Language: English - Date: 2010-12-08 14:19:25
    200Error detection and correction / Cryptographic hash functions / Advanced Encryption Standard / OpenSSL / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

    PDF Document

    Add to Reading List

    Source URL: www.openssl.org

    Language: English - Date: 2011-05-12 08:55:47
    UPDATE