Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard
暂无分享,去创建一个
[1] James H. Burrows,et al. Secure Hash Standard , 1995 .
[2] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[3] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[4] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[5] Shay Gueron,et al. SHA-512/256 , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[6] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[7] Quynh H. Dang. SP 800-107. Recommendation for Applications Using Approved Hash Algorithms , 2009 .
[8] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[9] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.
[10] Quynh H. Dang,et al. Recommendation for Applications Using Approved Hash Algorithms , 2009 .