


default search action
"Efficient implementation of the keyed-hash message authentication code ..."
Harris E. Michail et al. (2004)
- Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis:
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. ICECS 2004: 567-570

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.