Message authentication code

Results: 79



#Item
31Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
32Password / Message authentication code / Key / Crypt / Computer network security / Transport Layer Security / Secure Shell / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2006 Programming Project #1 Due: Friday, February 10th, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-01 12:20:25
33Technology / Human–computer interaction / Identification / Wireless / HMAC / Stream cipher / Electronic Product Code / Cryptography / Symmetric-key algorithm / Message authentication codes / Radio-frequency identification / Automatic identification and data capture

Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 14:09:34
34Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
35Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
36Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
37Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-03-13 22:33:48
38IP / Message authentication code / NP / Cryptography / Public-key cryptography / Digital signature

J. Cryptol[removed]: 310–348 DOI: [removed]s00145[removed]Multi-Verifier Signatures∗ Tom Roeder† Microsoft Research, Redmond, USA

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-03-16 18:26:36
39Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
40Computing / Telecommunications engineering / Ecma International / Near field communication / Message authentication code / ISO/IEC 14443 / ISO JTC 1/SC 27 / Office Open XML / Technology / Standards organizations / ISO standards

ECMA-411 1st Edition / December 2014 NFC-SEC-04: NFC-SEC Entity Authentication and Key

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-12-11 03:31:42
UPDATE