HMAC

Results: 319



#Item
81MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit  2

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44
82Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
83FIPS[removed]Security Policy

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:41:33
84Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski1 and Vlastimil Klima2 1 Faculty of Information Technology, Mathematics and Electrical Engineering,

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski1 and Vlastimil Klima2 1 Faculty of Information Technology, Mathematics and Electrical Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-07-31 05:53:00
85Internet Engineering Task Force (IETF) Request for Comments: 6150 Obsoletes: 1320 Category: Informational ISSN: [removed]

Internet Engineering Task Force (IETF) Request for Comments: 6150 Obsoletes: 1320 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-03-06 21:43:52
86FIPS[removed]Security Policy

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-06 07:32:08
87Microsoft Word - CTP Revision[removed]regarding[removed]Step 4.doc

Microsoft Word - CTP Revision[removed]regarding[removed]Step 4.doc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
88FIPS[removed]Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525

FIPS[removed]Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 15:05:01
89Cryptographic Hash Function  E DON - R Norwegian University of Science and Technology Trondheim, Norway

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
90Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18