@dblp

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.

, , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 410-419. Springer, (2007)

Links and resources

Tags