Message authentication codes

Results: 232



#Item
61Accelerating SSL with GPUs Keon Jang* Sangjin Han*  Seungyeop Han†

Accelerating SSL with GPUs Keon Jang* Sangjin Han* Seungyeop Han†

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2010-06-21 10:43:37
62WORKING PAPERS  © istockphoto.com/franckreporter From Data Schemes to Supersonic Codes

WORKING PAPERS © istockphoto.com/franckreporter From Data Schemes to Supersonic Codes

Add to Reading List

Source URL: www.insidegnss.com

Language: English - Date: 2015-01-21 05:00:44
63Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
64ECMA-409 1st Edition / December 2014 NFC-SEC-02: NFC-SEC Cryptography Standard using

ECMA-409 1st Edition / December 2014 NFC-SEC-02: NFC-SEC Cryptography Standard using

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-12-11 03:31:40
65An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
66Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
67Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
68Barco ICMP FIPS[removed]Non-Proprietary Security Policy  ICMP Barco ICMP FIPS 140-2

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
69QTI Cryptographic Module on Crypto 5 Core  FIPS[removed]Security Policy Version[removed]

QTI Cryptographic Module on Crypto 5 Core FIPS[removed]Security Policy Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:48:13
70Effective[removed]How to use this timetable ➤ 	Use the map to find the stops closest to where you will get on and off the bus. ➤ 	Select the schedule (Weekday,

Effective[removed]How to use this timetable ➤ Use the map to find the stops closest to where you will get on and off the bus. ➤ Select the schedule (Weekday,

Add to Reading List

Source URL: www.wmata.com

Language: English - Date: 2014-11-25 09:58:21