Message authentication codes

Results: 232



#Item
101Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
102Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

First Modes of Operation Workshop (October[removed]Encryption Modes with Almost Free Message Integrity jutla-auth.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:36:55
103Data / Information / Padding / CBC-MAC / Block size / Ciphertext stealing / Block cipher / Communications protocol / Cyberwarfare / Block cipher modes of operation / Cryptography / Message authentication codes

Second Modes of Operation Workshop (August[removed]Selected Comments and Issues

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:07:15
104Finite fields / Block cipher / CMAC / Padding / CBC-MAC / Message authentication codes / Cryptography / Block cipher modes of operation

First Modes of Operation Workshop (October 2000): Comments to NIST concerning AES Modes of Operations: A Suggestion for Handling Arbitrary-Length Messages with the CBC MAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:29:25
105HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
106Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
107Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:25:51
108Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / CBC-MAC / Ciphertext / Cipher / Block size / IEEE P1619 / Cryptography / Block cipher modes of operation / Message authentication codes

The Galois/Counter Mode of Operation (GCM)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:23:54
109Cryptographic protocols / Internet protocols / CCM mode / Block cipher / CBC-MAC / Authenticated encryption / IPsec / Cryptographic nonce / OCB mode / Cryptography / Block cipher modes of operation / Message authentication codes

Submission to NIST: Counter with CBC-MAC (CCM) AES Mode of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:54:44
110Message authentication codes / Initialization vector / Block cipher / Block size / Authenticated encryption / Crypto++ / Index of cryptography articles / CBC-MAC / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

04snlntTLraelkFoldernt_Auth_EncTAES-Spec.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:11:01
UPDATE