Search results
Search list
Results in:
1-1 of 1 results
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1