Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
暂无分享,去创建一个
Constantinos E. Goutis | Athanasios Kakarountas | Harris E. Michail | Athanasios Milidonis | A. Kakarountas | C. Goutis | A. Milidonis | H. Michail
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[3] Sandra Dominikus,et al. A hardware implementation of MD4-family hash algorithms , 2002, 9th International Conference on Electronics, Circuits and Systems.
[4] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[5] Paris Kitsos,et al. An efficient implementation of the digital signature algorithm , 2002, 9th International Conference on Electronics, Circuits and Systems.
[6] Michael Roe,et al. Performance of Block Ciphers and Hash Functions - One Year Later , 1994, FSE.
[7] Christopher C. White,et al. Focus on Durability, PATH Research at the National Institute of Standards and Technology | NIST , 2001 .