Date: 1999-06-15 18:30:25Hashing Cryptographic hash functions Block cipher HMAC CMAC MD5 Padding SHA-1 CBC-MAC Cryptography Message authentication codes Error detection and correction | | An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACsAdd to Reading ListSource URL: cseweb.ucsd.eduDownload Document from Source Website File Size: 339,75 KBShare Document on Facebook
|