Login / Signup

Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function.

Harris E. MichailAthanasios P. KakarountasAthanasios MilidonisCostas E. Goutis
Published in: ICECS (2004)
Keyphrases