×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [key derivation functions]
The History and Status of Web Crypto API (2012)
5.838 views
How to Use Cryptography Properly: The Common Mistakes People Make When Using Cryptographic Functions
56 views
Cryptographic Hash Functions and their many applications Shai Halevi – IBM Research USENIX Security – August 2009 Thanks to Charanjit Jutla and Hugo Krawczyk
220 views