HMAC

Results: 319



#Item
41Advanced Encryption Standard / Hashing / Disk encryption / FIPS 140-2 / HMAC / Key size / FIPS 140 / AES instruction set / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-24 07:36:43
42Cryptographic hash functions / Hashing / Internet standards / Email / MD5 / Crypt / SHA-2 / MD4 / HMAC / Error detection and correction / Computing / Cryptography

Perl versiondocumentation - Digest NAME Digest - Modules that calculate message digests SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:56:11
43Internet protocols / Internet standards / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / NetBackup / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 11:56:40
44Hash function / Information retrieval / Artificial intelligence / Information science / Cryptography / Cryptographic hash function / Message authentication codes / Hashing / HMAC

############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:49:28
45Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
46Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
47Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
48Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-12 10:35:54
49SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
50Impossible differential cryptanalysis / Block cipher / Differential cryptanalysis / HMAC / Symmetric-key algorithm / Cryptographic hash function / COSIC / Aanval / Advanced Encryption Standard / Cryptography / Hashing / SHACAL

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02
UPDATE