×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [nist sha]
Chapter 21 Public-Key Cryptography and Message Authentication
266 views
Institute for Applied Information Processing and Communications (IAIK) – Secure & Correct Systems 1 Georg Hofferek IAIK – Graz University of Technology
214 views
1 Hash Function. Hash Functions Dedicated Hash Functions ◦ Useful for lightweight authentication in RFID system Message Authentication Codes ◦ CBC-MAC
266 views
Week 5 - Monday. What did we talk about last time? Cryptographic hash functions
233 views
Cryptographic Hash Functions and Protocol Analysis
223 views