41![Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy](https://www.pdfsearch.io/img/0614946cf7d80c82f1fadf92a6825102.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-03-24 07:36:43
|
---|
42![Perl versiondocumentation - Digest NAME Digest - Modules that calculate message digests SYNOPSIS Perl versiondocumentation - Digest NAME Digest - Modules that calculate message digests SYNOPSIS](https://www.pdfsearch.io/img/f6861ebd06399ee9caf57024ad821673.jpg) | Add to Reading ListSource URL: perldoc.perl.orgLanguage: English - Date: 2014-10-03 15:56:11
|
---|
43![Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc](https://www.pdfsearch.io/img/3a77b54f59b139854e47f0ca88e1eddd.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-01-14 11:56:40
|
---|
44![############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64 ############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64](https://www.pdfsearch.io/img/ccfce1d9908bb292e866f8c262a925c8.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-08-08 12:49:28
|
---|
45![Microsoft Word - SamsungCryptoAPI_SPv1.12 Microsoft Word - SamsungCryptoAPI_SPv1.12](https://www.pdfsearch.io/img/dd762fb4a65c6b315b739227b7197a8a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-03-16 09:56:13
|
---|
46![1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya 1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya](https://www.pdfsearch.io/img/d064cce3f25de4ce93ceab9b2aa1fe7e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-12-06 19:52:41
|
---|
47![Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction](/pdf-icon.png) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 1999-06-15 18:30:25
|
---|
48![Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC](/pdf-icon.png) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-12 10:35:54
|
---|
49![An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp](https://www.pdfsearch.io/img/4d01d89589bd85e16f6a1751aed47894.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-01 12:22:01
|
---|
50![KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks](https://www.pdfsearch.io/img/4bc67cb75eaaef343acd35de561ad5c2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-11-28 12:43:02
|
---|