HMAC

Results: 319



#Item
251Hash functions / Binary arithmetic / Cyclic redundancy check / HMAC / SHA-1 / Checksum / Crypt / Cksum / Hash list / Error detection and correction / Hashing / Cryptographic hash functions

Queensland Office of Gaming Regulation Hashing Algorithms (formerly titled ‘Program Signature Algorithms’) Version 1.5

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-05-04 23:52:02
252FIPS 140 / HMAC / BlackBerry / Zeroisation / SHA-1 / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - BlackBerry Cryptographic Kernel v3.6 FIPS[removed]Security P.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
253Finite fields / Cryptographic protocols / Galois/Counter Mode / Hashing / Secure Real-time Transport Protocol / IPsec / IEEE 802.1AE / CMAC / HMAC / Cryptography / Message authentication codes / Block cipher modes of operation

GCM Update David McGrew and John Viega [removed], [removed] May 31, [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:52:56
254Message authentication codes / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / FIPS 140 / Key size / Cryptographic Module Validation Program / SHA-1 / HMAC / Cryptography / Cryptography standards / Error detection and correction

RSA BSAFE® Crypto-C Micro Edition[removed]FIPS[removed]Validation Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
255Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / HMAC / CMAC / Block cipher / MD5 / Message authentication codes / Cryptography / Block cipher modes of operation

Multiple forgery attacks against Message Authentication Codes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:53:41
256Cryptographic software / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key generation / Pseudorandom number generators / Zeroisation / Key Wrap / HMAC / Cryptography / Cryptography standards / Key management

Microsoft Word[removed]001_Safenet_SecurityPolicy-Rev_D.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-20 09:13:49
257Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
258Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
259Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

NIST SP[removed], Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:36:25
260Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
UPDATE