28,88 €
32,09 €
-10% with code: EXTRA
Recommendation for Applications Using Approved Hash Algorithms
Recommendation for Applications Using Approved Hash Algorithms
28,88
32,09 €
  • We will send in 10–14 business days.
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Ha…
  • SAVE -10% with code: EXTRA

Recommendation for Applications Using Approved Hash Algorithms (e-book) (used book) | bookbook.eu

Reviews

Description

Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).

EXTRA 10 % discount with code: EXTRA

28,88
32,09 €
We will send in 10–14 business days.

The promotion ends in 20d.00:26:44

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,32 Book Euros!?

Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)