Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
2007 ◽
pp. 410-419
◽
2014 ◽
Vol 519-520
◽
pp. 343-349