Cryptographic nonce

Results: 122



#Item
81X.509 / Public key infrastructure / PKCS / Credential / Cryptographic nonce / Cryptography / Public-key cryptography / Digital signature

Alpaca: Extensible Authorization for Distributed Services Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, and M. Frans Kaashoek MIT CSAIL Cambridge, MA, USA {ctl,

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2014-09-23 03:33:34
82Data / Cryptographic protocols / Computer network security / Internet standards / Internet protocols / Digest access authentication / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Computing / Internet / HTTP

Network Working Group Request for Comments: 2617 Obsoletes: 2069 Category: Standards Track J. Franks

Add to Reading List

Source URL: rfc.askapache.com

Language: English
83Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
84Trusted computing / Trusted Platform Module / Cryptographic nonce / Revocation list / Certificate authority / Counter / Transmission Control Protocol / Public key certificate / Trusted Computing Group / Cryptography / Public-key cryptography / Key management

Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS Marten van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory (C

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2007-05-24 15:48:08
85Cyberwarfare / WS-Security / Cryptographic nonce / Password / Replay attack / Cryptographic hash function / Crypt / OASIS / Digest access authentication / Cryptography / Computing / Computer security

Microsoft Word - oasis[removed]wss-username-token-profile-1.0.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-03-16 19:21:06
86Payment systems / Electronic commerce / Personal identification number / Cryptographic nonce / Mobile banking / One-time password / Transaction authentication number / Authentication / Automated teller machine / Technology / Security / Cryptography

Usably Secure, Low-Cost Authentication for Mobile Banking Saurabh Panjwani, Edward Cutrell Microsoft Research India {saurap,cutrell}@microsoft.com ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-06-22 10:03:22
87Cryptographic protocols / Internet protocols / CCM mode / Block cipher / CBC-MAC / Authenticated encryption / IPsec / Cryptographic nonce / OCB mode / Cryptography / Block cipher modes of operation / Message authentication codes

Submission to NIST: Counter with CBC-MAC (CCM) AES Mode of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:54:44
88Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes

CCM Use Requirements Specification.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:56:29
89Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
90One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:21
UPDATE