![Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms](https://www.pdfsearch.io/img/479d9387d8f9a5ee82073a4d6b773ee9.jpg)
| Document Date: 2010-12-02 17:52:59 Open Document File Size: 250,72 KBShare Result on Facebook
Company AES / / Country China / / IndustryTerm integrity algorithm / mobile communications / encryption algorithm / cryptographic algorithms / / Person M T IK / IV / Thomas Fuhr / Victor Shoup / Hugo Krawczyk / Henri Gilbert / Marion Videau / Jean-René Reinhard / / Technology Encryption / 128-EIA3 MAC algorithm / a third integrity algorithm / http / MAC Algorithms / candidate EIA algorithm / MAC algorithm / two cryptographic algorithms / 5 Algorithm / 3G / encryption algorithm / third LTE encryption / integrity algorithm / 128-EIA3 Integrity Algorithm / pdf / 128-EIA3 algorithm / stream cipher / / URL http /
SocialTag |