Hash-based message authentication code

Results: 15



#Item
11SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
12The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
13A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1  2

A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:26
14Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗  Peng Ning†

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
15Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42