1. 首页
  2. 数据库
  3. 其它
  4. NIST SP800 107 rev1.pdf

NIST SP800 107 rev1.pdf

上传者: 2021-02-19 18:10:47上传 PDF文件 336KB 热度 18次
A hash algorithm is used to map a message of arbitrary length to a fixed-length message digest. Federal Information Processing Standard (FIPS) 180-3, the Secure Hash Standard (SHS) [FIPS 180-3], specifies five approved hash algorithms: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. Secure hash algor
下载地址
用户评论