Message authentication codes

Results: 232



#Item
171Data Encryption Standard / Verilog / Message authentication codes / Galois/Counter Mode / CCM mode / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

GCE1 Core AES-GCM/CCM/CCM*/EAX’ Core www.ipcores.com General Description

Add to Reading List

Source URL: ipcores.com

Language: English - Date: 2012-03-19 22:59:04
172Cryptographic protocols / Authentication / Cryptography / Message authentication codes / Security

SUOMEN PANKKIYHDISTYS BANKFÖRENINGEN I FINLAND THE FINNISH BANKERS’ ASSOCIATION Information Security Committee

Add to Reading List

Source URL: www.fkl.fi

Language: English - Date: 2011-09-27 05:56:42
173Advanced Encryption Standard / Power analysis / Side channel attack / Microcontrollers / Stream ciphers / Message authentication codes / Joint Test Action Group / Field-programmable gate array / TI MSP430 / Cryptography / Electronic engineering / Electronics

In the blink of an eye: There goes your AES key (DRAFT of 28 May[removed]Sergei Skorobogatov Christopher Woods

Add to Reading List

Source URL: deeprecursion.com

Language: English - Date: 2014-05-15 05:47:01
174Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
175Advanced Encryption Standard / Stream ciphers / Message authentication codes / Key schedule / Matrix / Vector space / MDS matrix / VEST / XSL attack / Algebra / Cryptography / Mathematics

Essential Algebraic Structure Within the AES S. Murphy and M.J.B. Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2002-06-10 08:26:30
176Stream ciphers / Message authentication codes / Block cipher / Data Encryption Standard / Cipher / Linear cryptanalysis / Nicolas Courtois / Key schedule / Hidden Field Equations / Cryptography / XSL attack / Advanced Encryption Standard

Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:48:26
177Cryptographic protocols / Cryptographic primitive / Encryption / Symmetric-key algorithm / HMAC / Advanced Encryption Standard / Key / Block cipher modes of operation / Backup / Cryptography / Message authentication codes / Hashing

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
178CBC-MAC / Padding / Ciphertext / Hash function / Probabilistic encryption / One-way compression function / Cryptography / Block cipher modes of operation / Message authentication codes

CS255: Cryptography and Computer Security Winter 2012 Assignment #2 Due: 5pm Friday, Feb. 17, 2012.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-09 13:04:29
179Block cipher / Public-key cryptography / CMAC / Poly1305-AES / Cryptography / Message authentication codes / Cryptographic hash function

2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:43
180Secure communication / IEEE P1619 / Block cipher modes of operation / Cipher / Message authentication codes

2003 Paper 3 Question 9 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:38
UPDATE