HMAC

Results: 319



#Item
31CMAC / HMAC / Key / Authentication / Message authentication codes / Cryptography / Security

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Message Authentication —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:00
32HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
33HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
34Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
35Cryptography / Hashing / SHA-2 / Internet standards / SHA-1 / HMAC / MD5 / Base64 / Perl / Error detection and correction / Computing / Cryptographic hash functions

Perl versiondocumentation - Digest::SHA NAME Digest::SHA - Perl extension for SHA512 SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 16:10:43
36Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
37Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
38Advanced Encryption Standard / FIPS 140-2 / Key size / FIPS 140 / AES instruction set / HMAC / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography / Cryptography standards / Cryptographic software

Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-24 07:48:01
39Computing / MD5 / HMAC / Cryptographic hash function / MD2 / Md5sum / Public key fingerprint / Fingerprint / Checksum / Cryptography / Error detection and correction / Hashing

Perl versiondocumentation - Digest::MD5 NAME Digest::MD5 - Perl interface to the MD5 Algorithm SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:19:29
40Coupon / HMAC / Application programming interface / Business / Communication / Bonds / Marketing / Sales promotion

Kagi Coupon API I m p l e m e nt a t i o n a n d U s e r s G u i de Prepared by: Adam Yagiz, Kagi Web Support Technician April 29, 2011

Add to Reading List

Source URL: www.kagi.com

Language: English - Date: 2014-09-02 15:51:26
UPDATE