Message authentication code

Results: 79



#Item
11YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response  YubiKey Mac OS X Login

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
12Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg  Microsoft Research,

Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
13SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
14The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
15Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology   Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    16A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1  2

    A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:26
    171997 Paper 7 Question 9  Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

    1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:16
      18Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin  Alina Oprea

      Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

      Add to Reading List

      Source URL: www.zurich.ibm.com

      Language: English - Date: 2005-09-02 12:11:39
      19TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

      TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02
      20Efficient and Secure Source Authentication for Multicast Adrian Perrig   Ran Canetti

      Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

      Add to Reading List

      Source URL: www.isoc.org

      Language: English - Date: 2001-07-20 00:22:53