Message authentication codes

Results: 232



#Item
41Message authentication codes / Hashing / Hash function / MD5 / SHA-1 / Block cipher / Collision resistance / One-way compression function / CBC-MAC / Cryptography / Error detection and correction / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
42Computing / Message authentication codes / Password / Ciphertext / Key / Block cipher / Crypt / Secure communication / Transport Layer Security / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2005 Programming Project #1 Due: Monday, February 7th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-27 23:01:12
43Error detection and correction / Message authentication codes / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
44Cybernetics / State space / Science / Systems theory / Systems science / Control theory / Message authentication codes / CMAC

Chapter 5 Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Add to Reading List

Source URL: www.q12.org

Language: English - Date: 2002-03-13 22:50:54
45Cybernetics / State space / Science / Systems theory / Systems science / Control theory / Message authentication codes / CMAC

Chapter 5 Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Add to Reading List

Source URL: q12.org

Language: English - Date: 2002-03-13 22:50:54
46RSA / Advanced Encryption Standard / Block cipher modes of operation / Message authentication codes / Cryptography / Stream cipher / Advantage

Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár EPFL, Switzerland Abstract. We propose pure OMD (p-OMD) as a new variant of the Offset Merkle-Damgård (

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 11:16:42
47Technology / Human–computer interaction / Identification / Wireless / HMAC / Stream cipher / Electronic Product Code / Cryptography / Symmetric-key algorithm / Message authentication codes / Radio-frequency identification / Automatic identification and data capture

Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 14:09:34
48Committees / Consultative Committee for Space Data Systems / Cryptographic hash functions / Key size / Galois/Counter Mode / Advanced Encryption Standard / Block cipher / National Security Agency / SHA-1 / Cryptography / Message authentication codes / CCSDS

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
49Security / CCSDS / Authentication / HMAC / Measurement / Science / Message authentication codes / Committees / Consultative Committee for Space Data Systems

Report Concerning Space Data System Standards AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2008-04-01 13:44:37
50Advanced Encryption Standard / Cryptographic software / FIPS 140-2 / FIPS 140 / Block cipher modes of operation / HMAC / Zeroisation / Crypto++ / AES implementations / Cryptography / Cryptography standards / Message authentication codes

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49
UPDATE