HMAC

Results: 319



#Item
261Computing / HTTP / Password / HMAC / Teleconference / WebEx / Daewoo Precision Industries K2 / Universally unique identifier / SHA-2 / Identification / Cryptographic protocols / Security

BANKRUPTCY COURT BROWNBAG COURTROOM – 1132 BISHOP STREET, SUITE 250 WEDNESDAY, JANUARY 15, 2014, 12 NOON – 1:00 PM Electronic Proofs of Claim (ePOC); Filing Claims and Getting Paid in Chapter 13 WEBEX Instructions Re

Add to Reading List

Source URL: www.hib.uscourts.gov

Language: English - Date: 2014-01-03 16:10:20
262Cryptographic software / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-1 / Transport Layer Security / Public-key cryptography / HMAC / Cryptography / Error detection and correction / Computing

Cryptographic Technology Group Lily Chen, Acting Manager of CTG June 4, 2013 Z M (padded)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 17:39:21
263Internet protocols / Cryptographic software / FIPS 140-2 / Password / HMAC / FIPS 140 / PKCS / IPsec / SHA-1 / Cryptography / Cryptography standards / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-02 16:29:20
264Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
265SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
266Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
267SHA-1 / SHA-2 / MD4 / HMAC / Block cipher / Key size / Py / Data Encryption Standard / Crypt / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - preneel_abudhabiv2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-12-11 02:59:17
268Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
269Hashing / MD4 / MD5 / SHA-1 / MD2 / RIPEMD / Collision attack / HMAC / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
270Hashing / Collision attack / Preimage attack / MD5 / SHA-2 / Shadow password / HMAC / SHA-1 / Crypt / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft PowerPoint - PracticalImpact_talk4

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
UPDATE