HMAC

Results: 319



#Item
11YubiKey VIP • YubiKey VIP offers strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button and is specially programmed to work with Symantec VIP • Works instantly with no need t

YubiKey VIP • YubiKey VIP offers strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button and is specially programmed to work with Symantec VIP • Works instantly with no need t

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
12YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi

YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:42
13Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo1 , Yu Sasaki2 , Lei Wang1 , Meiqin Wang3 ⋆ , and Long Wen3 1  3

Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo1 , Yu Sasaki2 , Lei Wang1 , Meiqin Wang3 ⋆ , and Long Wen3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-02 06:21:15
    14The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

    The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-07-24 05:23:52
    15Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan.

    Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-02-23 10:32:52
      16Preliminary Specification X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules EL PR IM

      Preliminary Specification X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules EL PR IM

      Add to Reading List

      Source URL: pubs.opengroup.org

      Language: English - Date: 2003-01-28 06:23:48
      17The HMAC construction: A decade later Ran Canetti IBM Research  What is HMAC?

      The HMAC construction: A decade later Ran Canetti IBM Research What is HMAC?

      Add to Reading List

      Source URL: www.cs.tau.ac.il

      Language: English - Date: 2008-10-06 08:08:14
        18CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

        CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

        Add to Reading List

        Source URL: www.ecsec.jp

        Language: English - Date: 2014-09-26 04:10:08
        19Microsoft PowerPoint - preneel_enisa08v4.ppt

        Microsoft PowerPoint - preneel_enisa08v4.ppt

        Add to Reading List

        Source URL: www.nis-summer-school.eu

        Language: English - Date: 2008-10-20 04:40:05
        20draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3

        draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3

        Add to Reading List

        Source URL: tools.ietf.org

        - Date: 2015-04-22 05:03:32