Old Web
English
Sign In
Acemap
>
Paper
>
Recommendation for Applications Using Approved Hash Algorithms | NIST
Recommendation for Applications Using Approved Hash Algorithms | NIST
2012
Quynh H. Dang
Keywords:
Hash-based message authentication code
NIST
Database
Digital signature
Cryptographic hash function
Hash function
Computer science
Random number generation
Data mining
Correction
Source
Cite
Save
Machine Reading By IdeaReader
0
References
30
Citations
NaN
KQI
[]