Message authentication codes

Results: 232



#Item
61Cryptographic protocols / Internet / Internet protocols / Cryptographic software / Message authentication codes / SSL acceleration / Transport Layer Security / Cipher suite / Advanced Encryption Standard / Computing / Cryptography / Secure communication

Accelerating SSL with GPUs Keon Jang* Sangjin Han* Seungyeop Han†

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2010-06-21 10:43:37
62Satellite navigation systems / Message authentication codes / Computer security / Access control / Authentication / Notary / Binary offset carrier / Application security / Satellite navigation / Cryptography / Security / Technology

WORKING PAPERS © istockphoto.com/franckreporter From Data Schemes to Supersonic Codes

Add to Reading List

Source URL: www.insidegnss.com

Language: English - Date: 2015-01-21 05:00:44
63Block cipher / Cryptographic hash function / Advanced Encryption Standard / Cryptography / Message authentication codes / CBC-MAC

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
64Ecma International / CMAC / Computer file formats / Evaluation / Reference / ISO standards / Standards organizations / Message authentication codes / Computing

ECMA-409 1st Edition / December 2014 NFC-SEC-02: NFC-SEC Cryptography Standard using

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-12-11 03:31:40
65Poly1305-AES / Block cipher / VMAC / Advanced Encryption Standard / Tiny Encryption Algorithm / CBC-MAC / ARIA / Q / Triple DES / Cryptography / Message authentication codes / CMAC

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
66Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
67Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
68Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
69Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / SHA-2 / HMAC / FIPS 140 / Block cipher / Crypto++ / AES implementations / Cryptography / Cryptography standards / Cryptographic software

QTI Cryptographic Module on Crypto 5 Core FIPS[removed]Security Policy Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:48:13
70One-key MAC / Ballston–MU / Washington /  D.C. / Message authentication codes / Pennsylvania Avenue / Foggy Bottom

Effective[removed]How to use this timetable ➤ Use the map to find the stops closest to where you will get on and off the bus. ➤ Select the schedule (Weekday,

Add to Reading List

Source URL: www.wmata.com

Language: English - Date: 2014-11-25 09:58:21
UPDATE