Reference Citations - HerongYang.com - v2.91, by Dr. Herong Yang
Secure Hashing Algorithm
'Cryptography Tutorials - Herong's Tutorial Examples' tutorial was cited in a presentation slides in 2018.
The Cryptography Tutorials - Herong's Tutorial Examples tutorial was cited in a presentation slides in 2018.
Subject: Secure Hashing Algorithm Date: Jun 30, 2018 Author: Ruth Betcher Source: https://slideplayer.com/slide/3383172/ Purpose: Authentication Not Encryption Authentication Requirements: . Masquerade – Insertion of message from fraudulent source . Content Modification - Changing content of message . Sequence Modification - Insertion, deletion and reordering sequence . Timing Modification - Replacing valid sessions ... Bibliography http://www.herongyang.com http://www.ipa.org/security...
Table of Contents