HMAC

Results: 319



#Item
271The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
272Most Recent Results on SHA-1

Most Recent Results on SHA-1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
273Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
274The K  SHA-3 submission

The K SHA-3 submission

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
275Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2010-10-20 22:30:55
276[removed]and Dual EC DRBG John Kelsey, NIST

[removed]and Dual EC DRBG John Kelsey, NIST

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-12-25 17:11:15
277BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-26 14:43:26
278Symmetric Key Management: Key Derivation and Key Wrap ¨

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
279NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
280SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31