HMAC

Results: 319



#Item
271Cryptographic protocols / Cryptographic primitive / Encryption / Symmetric-key algorithm / HMAC / Advanced Encryption Standard / Key / Block cipher modes of operation / Backup / Cryptography / Message authentication codes / Hashing

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
272DC Comics / Cryptographic hash functions / HMAC / SHA-1 / Institute for Applied Information Processing and Communications / Krypto / MD5 / Error detection and correction / Cryptography / Hashing

Most Recent Results on SHA-1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
273Search algorithms / Preimage attack / Error detection and correction / Universal one-way hash function / Collision resistance / HMAC / Hash function / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
274NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions

The K SHA-3 submission

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
275Randomness / Computational complexity theory / Information theory / Pseudorandomness / Hashing / Randomness extractor / Leftover hash lemma / Entropy / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2010-10-20 22:30:55
276Security / Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / National security / Hash function / Cryptographic hash function / HMAC / Cryptography / Hashing / Pseudorandom number generators

[removed]and Dual EC DRBG John Kelsey, NIST

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-12-25 17:11:15
277Cryptography / NIST hash function competition / SHA-2 / Hash function / SHA-1 / MD5 / Hash tree / Keccak / HMAC / Error detection and correction / Cryptographic hash functions / Hashing

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-26 14:43:26
278Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
279Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
280Preimage attack / Collision attack / HMAC / SHA-2 / Hash function / SMASH / MD5 / SHA-1 / One-way function / Cryptographic hash functions / Cryptography / Error detection and correction

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
UPDATE