First Page | Document Content | |
---|---|---|
Cryptographic hash functions Hashing SHA-2 Transport Layer Security SHA-1 HMAC Message authentication code Collision attack Key size Cryptography Cryptographic protocols Internet protocols | Approved Cryptographic Algorithms Good Practice Guideline Programme NHS InformaticsAdd to Reading ListSource URL: systems.hscic.gov.ukDownload Document from Source WebsiteFile Size: 504,95 KBShare Document on Facebook |