Message authentication codes

Results: 232



#Item
41CS255: Cryptography and Computer Security  Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
42CS255: Cryptography and Computer Security  Winter 2005 Programming Project #1 Due: Monday, February 7th, 2005.

CS255: Cryptography and Computer Security Winter 2005 Programming Project #1 Due: Monday, February 7th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-27 23:01:12
43CS255: Cryptography and Computer Security  Winter 1999 Assignment #3

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
44Chapter 5  Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Chapter 5 Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Add to Reading List

Source URL: www.q12.org

Language: English - Date: 2002-03-13 22:50:54
45Chapter 5  Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Chapter 5 Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Add to Reading List

Source URL: q12.org

Language: English - Date: 2002-03-13 22:50:54
46Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár EPFL, Switzerland Abstract. We propose pure OMD (p-OMD) as a new variant of the Offset Merkle-Damgård (

Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár EPFL, Switzerland Abstract. We propose pure OMD (p-OMD) as a new variant of the Offset Merkle-Damgård (

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 11:16:42
47Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 14:09:34
48Report Concerning Space Data System Standards  CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
49Report Concerning Space Data System Standards  AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY  INFORMATIONAL REPORT

Report Concerning Space Data System Standards AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2008-04-01 13:44:37
50Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49