Back to Results
First PageMeta Content
Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography


Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm
Add to Reading List

Document Date: 2015-04-30 15:30:26


Open Document

File Size: 371,12 KB

Share Result on Facebook

/

Facility

National Institute of Standards and Technology / /

IndustryTerm

hash algorithms / communication network / http /

OperatingSystem

Ubuntu / /

Organization

National Institute of Standards and Technology / Purdue University / /

Person

Avi Kak / Key Calculate Hash / Avinash Kak / /

Position

Synaptic Package Manager / /

ProgrammingLanguage

Perl / Python / K / /

Technology

encryption / hash algorithms / SHA algorithms / 7.2 The SHA-512 Secure Hash Algorithm / private key / Perl / secret key / public key / SHA-1 algorithm / symmetric-key encryption / Avi / /

URL

http /

SocialTag