-
2
-
-
0013091373
-
The Keyed-hash message authentication code (HMAC)
-
US Doc/NIST, March 6
-
FIPS Publication 198. The Keyed-hash message authentication code (HMAC). US Doc/NIST, March 6, 2002.
-
(2002)
FIPS Publication
, vol.198
-
-
-
3
-
-
0003338165
-
The use of HMAC-SHA-1-96 within ESP and AH
-
November
-
Madson C, Glenn R. The use of HMAC-SHA-1-96 within ESP and AH. RFC 2404, November 1998.
-
(1998)
RFC
, vol.2404
-
-
Madson, C.1
Glenn, R.2
-
4
-
-
0003195066
-
The MD5 message digest algorithm
-
April
-
Rivest RL. The MD5 message digest algorithm. RFC 1321, April 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.L.1
-
5
-
-
73249134721
-
Secure hash standard (SHS)
-
US Doc/NIST, April 17
-
FIPS Publication 180-1. Secure hash standard (SHS). US Doc/NIST, April 17, 1995.
-
(1995)
FIPS Publication
, vol.180
, Issue.1
-
-
-
6
-
-
84965066515
-
Advanced encryption standard (AES)
-
US Doc/NIST, November 26
-
FIPS Publication 197. Advanced encryption standard (AES). US Doc/NIST, November 26, 2001.
-
(2001)
FIPS Publication
, vol.197
-
-
-
7
-
-
79953067606
-
Secure hash standard (SHS)
-
US Doc/NIST, May 30
-
FIPS Publication 180-2. Secure hash standard (SHS). US Doc/NIST, May 30, 2001.
-
(2001)
FIPS Publication
, vol.180
, Issue.2
-
-
-
8
-
-
29144448150
-
Secure hash standard (SHS) change notice 1
-
US Doc/NIST, February
-
FIPS Publication 180-2. Secure hash standard (SHS) change notice 1. US Doc/NIST, February 2004.
-
(2004)
FIPS Publication
, vol.180
, Issue.2
-
-
-
11
-
-
0042967843
-
Performance analysis and parallel implementation of dedicated hash functions on Pentium III
-
J. Nakajima, and M. Matsui Performance analysis and parallel implementation of dedicated hash functions on Pentium III IEICE Transactions on Fundamentals E86-A 1 2003 54 63
-
(2003)
IEICE Transactions on Fundamentals
, vol.E86-A
, Issue.1
, pp. 54-63
-
-
Nakajima, J.1
Matsui, M.2
-
15
-
-
84945300922
-
Comparative analysis of the hardware implementation of hash functions SHA-1 and SHA-512
-
Springer-Verlag
-
T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, and J. Flidr Comparative analysis of the hardware implementation of hash functions SHA-1 and SHA-512 Proceedings of the 5th international conference on information security (ISC'2002), LNCS 2433 2002 Springer-Verlag 75 89
-
(2002)
Proceedings of the 5th International Conference on Information Security (ISC'2002), LNCS 2433
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
-
16
-
-
0037744606
-
On the hardware implementation of the SHA-2 (256, 384, 512) hash functions
-
May
-
Sklavos N, Koufopavlou O. On the hardware implementation of the SHA-2 (256, 384, 512) hash functions. In: Proceedings of the IEEE international symposium on circuits and systems, vol. 5, May 2003. p. 153-6.
-
(2003)
Proceedings of the IEEE International Symposium on Circuits and Systems
, vol.5
, pp. 153-156
-
-
Sklavos, N.1
Koufopavlou, O.2
-
19
-
-
29144496621
-
RSA cryptography specifications-version 2.0
-
October
-
Kaliski B, Staddon J. RSA cryptography specifications-Version 2.0. RFC 2437, October 1998.
-
(1998)
RFC
, vol.2437
-
-
Kaliski, B.1
Staddon, J.2
-
21
-
-
0003286492
-
The TLS protocol-Version 1.0
-
January
-
Dierks T, Allen C. The TLS protocol-Version 1.0. RFC 2246, January 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
|