<--- Back to Details
First PageDocument Content
Hashing / Data Encryption Standard / Finite fields / HMAC / Triple DES / Advanced Encryption Standard / SHA-2 / RSA / CMAC / Cryptography / Message authentication codes / Cryptographic hash functions
Date: 2014-09-26 04:10:08
Hashing
Data Encryption Standard
Finite fields
HMAC
Triple DES
Advanced Encryption Standard
SHA-2
RSA
CMAC
Cryptography
Message authentication codes
Cryptographic hash functions

CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

Add to Reading List

Source URL: www.ecsec.jp

Download Document from Source Website

File Size: 212,03 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document