HMAC

Results: 319



#Item
21EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
22HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:09:52
23Bond 2012 Update Council Briefing February 17, 2015 1  Bond 2012 Update

Bond 2012 Update Council Briefing February 17, 2015 1 Bond 2012 Update

Add to Reading List

Source URL: engineercc.com

Language: English - Date: 2015-02-18 09:49:25
24Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:50:50
25Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx

Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-07 14:15:51
26Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
27IC2M Security Policy_rel5

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
28Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
29AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it

AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2010-06-10 05:02:59
30IEEE C802.16c-02/02r1Project

IEEE C802.16c-02/02r1Project

Add to Reading List

Source URL: wirelessman.org

Language: English - Date: 2002-05-23 19:00:39