HMAC

Results: 319



#Item
81Hashing / Key management / PBKDF2 / SHA-2 / HMAC / Crypt / MD5 / Password / Key / Cryptography / Error detection and correction / Cryptographic hash functions

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44
82Hashing / Search algorithms / Hash function / Preimage attack / SHA-1 / Collision attack / HMAC / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Error detection and correction

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
83Cryptographic hash functions / Computing / FIPS 140 / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:41:33
84Hashing / Randomness / Information theory / Search algorithms / Entropy / SHA-2 / Hash function / HMAC / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski1 and Vlastimil Klima2 1 Faculty of Information Technology, Mathematics and Electrical Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-07-31 05:53:00
85Cryptographic hash functions / Hashing / Cryptographic protocols / MD4 / Internet protocols / Secure communication / HMAC / MD5 / MD2 / Cryptography / Error detection and correction / Computing

Internet Engineering Task Force (IETF) Request for Comments: 6150 Obsoletes: 1320 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-03-06 21:43:52
86Cryptographic hash functions / Computing / FIPS 140 / Cryptographic software / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-06 07:32:08
87Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP Revision[removed]regarding[removed]Step 4.doc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
88Internet protocols / Cryptographic protocols / Data / Computer network security / Technical terminology / Extensible Threat Management / FIPS 140 / HMAC / Transport Layer Security / Computing / Cryptography / Cryptography standards

FIPS[removed]Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 15:05:01
89Hashing / SHA-2 / Hash function / HMAC / Endianness / Preimage attack / Padding / Collision attack / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
90Hashing / Computing / Data logger / Recorders / Computer data logging / Log analysis / HMAC / Hash function / Public-key cryptography / Cryptography / Technology / Search algorithms

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
UPDATE