First Page | Document Content | |
---|---|---|
Date: 2016-05-26 13:27:36Cryptography Message authentication codes Cryptography standards Cryptographic software Cryptographic hash functions Hashing Digital Signature Algorithm FIPS 140-2 Dual EC DRBG OpenSSL SHA-2 Hash-based message authentication code | FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.Add to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 250,47 KBShare Document on Facebook |
Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptxDocID: 1qYFO - View Document | |
FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.DocID: 1qHZI - View Document | |
Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-ExupéryDocID: 1pTjt - View Document | |
The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. PatDocID: 1oU0H - View Document | |
Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) ConstructionsDocID: 1o3Yp - View Document |