Message authentication code

Results: 79



#Item
11Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
12Cryptography / Crypto-anarchism / Internet privacy / Mix network / Secure communication / Ciphertext indistinguishability / Message authentication code

Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:59
13Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
14Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
15

Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    16Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

    A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:26
    17

    1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:16
      18Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

      Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

      Add to Reading List

      Source URL: www.zurich.ibm.com

      Language: English - Date: 2005-09-02 12:11:39
      19IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

      TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02
      20Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

      Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

      Add to Reading List

      Source URL: www.isoc.org

      Language: English - Date: 2001-07-20 00:22:53
      UPDATE