HMAC

Results: 319



#Item
31Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Message Authentication —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Message Authentication —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:00
32Crypto Corner Editors: Peter Gutmann,  David Naccache,  Charles C. Palmer,   Room at the Bottom

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
33FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
34CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
35Perl versiondocumentation - Digest::SHA  NAME Digest::SHA - Perl extension for SHA512  SYNOPSIS

Perl versiondocumentation - Digest::SHA NAME Digest::SHA - Perl extension for SHA512 SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 16:10:43
36Bouncy Castle FIPS Java API  1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
37Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
38Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-24 07:48:01
39Perl versiondocumentation - Digest::MD5  NAME Digest::MD5 - Perl interface to the MD5 Algorithm  SYNOPSIS

Perl versiondocumentation - Digest::MD5 NAME Digest::MD5 - Perl interface to the MD5 Algorithm SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:19:29
40Kagi Coupon API I m p l e m e nt a t i o n a n d U s e r s G u i de Prepared by: Adam Yagiz, Kagi Web Support Technician April 29, 2011

Kagi Coupon API I m p l e m e nt a t i o n a n d U s e r s G u i de Prepared by: Adam Yagiz, Kagi Web Support Technician April 29, 2011

Add to Reading List

Source URL: www.kagi.com

Language: English - Date: 2014-09-02 15:51:26