×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [nist sha]
Documents
Chapter 21 Public-Key Cryptography and Message Authentication
277 views
Documents
1 Hash Function. Hash Functions Dedicated Hash Functions ◦ Useful for lightweight authentication in RFID system Message Authentication Codes ◦ CBC-MAC
274 views
Documents
Week 5 - Monday. What did we talk about last time? Cryptographic hash functions
233 views
Documents
Institute for Applied Information Processing and Communications (IAIK) – Secure & Correct Systems 1 Georg Hofferek IAIK – Graz University of Technology
216 views
Documents
Cryptographic Hash Functions and Protocol Analysis
233 views