Message authentication codes

Results: 232



#Item
51Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
52GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
53Cryptographic hashing  Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
54CMAC OPERATIONAL SUMMARY PROGRESS REPORT 1992 UP TO JUN‐2011 Responsed  Small Arms (kg)

CMAC OPERATIONAL SUMMARY PROGRESS REPORT 1992 UP TO JUN‐2011 Responsed Small Arms (kg)

Add to Reading List

Source URL: cmac.gov.kh

Language: English - Date: 2011-09-19 06:47:22
55Encryption and Security Tutorial Peter Gutmann University of Auckland http://www.cs.auckland.ac.nz/~pgut001  Security Requirements

Encryption and Security Tutorial Peter Gutmann University of Auckland http://www.cs.auckland.ac.nz/~pgut001 Security Requirements

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 12:55:08
56J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
57SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:52:10
58Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK  Krzysztof Pietrzak

Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK Krzysztof Pietrzak

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
59TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
60Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20