Information technology. Security techniques. Digital signature schemes giving message recovery-Discrete logarithm based mechanisms
Document status: Active
Information technology. Security techniques. Message Authentication Codes (MACs)-Mechanisms using a block cipher
Document status: Active
Information technology. Security techniques. Message authentication codes (MACs)-Mechanisms using a block cipher
Document status: Active
Data cryptographic techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
Document status: Active
Information technology. Security techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
Document status: Active
Information technology. Security techniques. Message authentication codes (MACs)-Mechanisms using a dedicated hash-function
Document status: Active
Information technology. Security techniques. Message Authentication Codes (MACs)-Mechanisms using a dedicated hash-function
Document status: Active
Information security. Message authentication codes (MACs)-Mechanisms using a dedicated hash-function
Document status: Active
Information technology. Security techniques. Message Authentication Codes (MACs)-Mechanisms using a universal hash-function
Document status: Active
Information technology. Security techniques. Message Authentication Codes (MACs)-Mechanisms using a universal hash-function
Document status: Active