HMAC

Results: 319



#Item
281The Hitchhiker's Guide   to the SHA-3 Competition

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
282The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
283Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
284Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
2851  2

1 2

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-03-01 13:51:19
286Offline dictionary attack on TCG TPM weak authorisation data, and solution Liqun Chen

Offline dictionary attack on TCG TPM weak authorisation data, and solution Liqun Chen

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:23
287Everything you need to know   about cryptography in 1 hour

Everything you need to know about cryptography in 1 hour

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2011-07-30 14:49:49
288

PDF Document

Add to Reading List

Source URL: www.scardsoft.com

Language: English - Date: 2009-02-19 09:40:46
289

PDF Document

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2009-09-27 19:06:37
290

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2001-09-27 19:15:27