Cryptographic hash function

Results: 1121



#Item
731Hashing / Cryptographic hash function / Key / HMAC / Symmetric-key algorithm / Block cipher / CMAC / Initialization vector / Advanced Encryption Standard / Cryptography / Message authentication codes / Key management

NIST SP 800-56C Second Draft, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 13:48:23
732FIPS 140 / PKCS11 / PKCS / Cryptographic Module Validation Program / Critical Security Parameter / HMAC / Cryptographic hash function / SHA-2 / Advanced Encryption Standard / Cryptography / Cryptography standards / FIPS 140-2

Entrust Admin User Groups Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
733Block cipher / CBC-MAC / Cryptographic hash function / Symmetric-key algorithm / Advantage / Cipher / CMAC / Index of cryptography articles / Cryptography / Block cipher modes of operation / Message authentication codes

Comments on NIST’s RMAC Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:27:22
734Search algorithms / Cryptographic hash functions / Galois/Counter Mode / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Message authentication codes

Galois MAC with forgery probability close to ideal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:16:52
735Cryptographic hash function / Advanced Encryption Standard / Cipher / Index of cryptography articles / Galois/Counter Mode / Cryptography / Message authentication codes / Block cipher

Comments on the RMAC algorithm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:16:32
736Authenticated encryption / Initialization vector / Block cipher / Ciphertext / Cryptographic hash function / Keystream / Stream cipher / Cipher / Chosen-ciphertext attack / Cryptography / Block cipher modes of operation / Galois/Counter Mode

JOUX - Authentication Failures in NIST version of GCM

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:12:38
737Authenticated encryption / Block cipher / IEEE P1619 / Cryptographic hash function / Cryptography / Block cipher modes of operation / Galois/Counter Mode

Microsoft Word - GCM_public_comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:11:54
738Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / HMAC / CMAC / Block cipher / MD5 / Message authentication codes / Cryptography / Block cipher modes of operation

Multiple forgery attacks against Message Authentication Codes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:53:41
739Hash function / SHA-1 / BibTeX / Computing / Artificial intelligence / Information science / Cryptographic hash functions / Search algorithms / Error detection and correction

Package ‘repmis’ July 2, 2014 Type Package Title A collection of miscellaneous tools for reproducible research with R. Description The package includes tools to load R packages and automatically generate BibTeX files

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:16:53
740Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
UPDATE