[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

hardware random number generators, testing  [See FIPS 140-1 tests]
hardware validation 
hash functions 
    block ciphers, construction from 
    encryption using 
    incremental hashing 
    insecurity of 
    one-way hash using a block cipher 
hash values 
hash127 
    MAC, usage for 
hash127( ) 
hashes 
hexadecimal format
    ASCII, conversion into binary 
    representing binary keys or raw data in 
high-level vs. low-level modes 
HMAC  2nd 
    nonces, using with 
HMAC algorithm 
HMAC-SHA1 algorithm
    in PRF implementation 
    pseudo-random number generator, using as 
HMAC_cleanup( ) 
HMAC_Final( ) 
HMAC_Init( )  2nd 
HMAC_Update( ) 
hostnames
    checking, adding to certificate verification 
        CryptoAPI 
        OpenSSL 
    restricting access based on 
    spoofing 
Housley, Russ  2nd 
HTML and cross-site scripting attacks 
htonl( ) 
HTTP client for connection to CRL server 

[ Team LiB ]