HMAC

Results: 319



#Item
91Hashing / Message authentication codes / Search algorithms / Preimage attack / HMAC / Collision resistance / MD5 / CBC-MAC / Universal hashing / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
92Internet protocols / Cryptographic protocols / Internet standards / Hashing / Computer network security / Kerberos / HMAC / Hash function / Transmission Control Protocol / Computing / Cryptography / Data

The KX.509 Protocol William Doster Marcus Watts Dan Hyde University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2001-09-26 12:44:24
93KMAC / SHA-2 / CMAC / Computing / Internet protocols / Computer programming / Mathematics / Message authentication codes / Hashing / HMAC

SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:52:10
94Data synchronization / Cloud storage / Dropbox / SpiderOak / Comparison of online backup services / Software / Computing / File hosting

Secure Dropbox Alternatives Comparison Chart* SpiderOak Yes – AES-256 in CFB Client-side encryption mode and HMAC-SHA256

Add to Reading List

Source URL: www.cloudwards.net

Language: English - Date: 2015-01-05 09:53:16
95Cryptographic hash functions / Cryptography standards / Elliptic curve cryptography / SHA-2 / HMAC / PKCS / SHA-1 / Smart card / PCI Express / Cryptography / Cryptographic software / Error detection and correction

TrustWay Crypto PCI: an EAL4+ Common Criteria certified, ANSSI-qualified, cryptographic resource TrustWay® Crypto PCI is a cryptographic solution – 100% developed and manufactured in France by Bull – featuring the l

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2011-05-09 09:52:35
96Computing / Transparent Data Encryption / Cross-platform software / Message authentication codes / Oracle Corporation / Oracle Database / HMAC / Vormetric / Cryptography standards / Cryptography / Software / Disk encryption

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
97Cryptography standards / PKCS / SHA-2 / Smart card / Elliptic curve cryptography / HMAC / Network Security Services / Cryptlib / Cryptography / Cryptographic software / Public-key cryptography

TrustWay® box, the same encryption device, whatever platform or OS you use TrustWay® box is an encryption device – developed 100% by Bull and manufactured in France – which features the very latest technological de

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-10-21 08:54:15
98Hashing / Enterprise application integration / Service-oriented architecture / SOA Security / HMAC / SHA-2 / Software engineering / Cryptography standards / Computing / Web services / Information technology management

TrustWay® box XML Gateway Bull and Vordel, partners in the supply of a certified, high-security Service-Oriented Architecture governance solution The TrustWay box XML Gateway guarantees a very high level of security a

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-11-29 07:31:10
99Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
100Cryptographic hash functions / Hashing / Advanced Encryption Standard / HMAC / SHA-2 / FIPS 140-2 / OpenSSL / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

OpenSSL FIPS Object Module Version 1.2 By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2009-11-20 10:26:39
UPDATE