HMAC

Results: 319



#Item
21Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Hash function / Crypt / Merkle–Damgård construction / Error detection and correction / Cryptographic hash functions / Cryptography

EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
22Hashing / FIPS 140-2 / HMAC / Microsoft CryptoAPI / Advanced Encryption Standard / Critical Security Parameter / FIPS 140 / SHA-2 / Key Wrap / Cryptography / Cryptographic software / Cryptography standards

HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:09:52
23Pavements / HMAC / Hashing / Geography of California / Staple / Concrete / Alameda /  California / Visual arts / Construction / Building materials

Bond 2012 Update Council Briefing February 17, 2015 1 Bond 2012 Update

Add to Reading List

Source URL: engineercc.com

Language: English - Date: 2015-02-18 09:49:25
24Hashing / Cryptographic hash functions / Advanced Encryption Standard / HMAC / FIPS 140-2 / SHA-2 / SHA-1 / FIPS 140 / OpenSSL / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:50:50
25Secure communication / Cryptographic software / Internet standards / Cipher suite / Secure Shell / Transport Layer Security / HMAC / Key size / Public-key cryptography / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-07 14:15:51
26FIPS 140-2 / HMAC / Microsoft CryptoAPI / Critical Security Parameter / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key Wrap / Zeroisation / Cryptography / Cryptographic software / Cryptography standards

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
27Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
28SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
29Information / Communications protocol / Transport Layer Security / Security protocol notation / Public-key cryptography / Transmission Control Protocol / Diffie–Hellman key exchange / HMAC / Cryptographic protocols / Cryptography / Data

AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2010-06-10 05:02:59
30HMAC / Computing / IEEE 802 / Metropolitan area networks / IEEE 802.16

IEEE C802.16c-02/02r1Project

Add to Reading List

Source URL: wirelessman.org

Language: English - Date: 2002-05-23 19:00:39
UPDATE