Minimalist Cryptography: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
Cryptography that can be implemented on devices with very limited memory and computing capabilities, such as RFID tags.
Source: NIST SP 800-98 | Category: