Message authentication

Results: 402



#Item
11Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
12Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
13Economy / E-commerce / Business / Payment systems / Electronic funds transfer / Merchant services / Payment gateway / 3-D Secure / Credit card / PayPal / Error message / Authentication

Technical_Implementation_Guide_standardWebService_V4_Systempay_V1.4b

Add to Reading List

Source URL: systempay.cyberpluspaiement.com

Language: English - Date: 2015-01-26 09:14:56
14Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
15Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
16Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:22:52
17Email / Webmail / Spam filtering / Email client / Simple Mail Transfer Protocol / Password / Message transfer agent / Gmail / SMTP Authentication / Outlook.com / Transport Layer Security / Internet Message Access Protocol

Email Support Document Apple Mail .................................................................................................................................................................. As a convenience to ou

Add to Reading List

Source URL: onlinedesigns.co.nz

Language: English - Date: 2016-07-18 17:29:54
18Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
19Internet Standards / Internet protocols / Short Message Service / Text messaging / Transmission Control Protocol / Cryptographic protocols / Network protocols / Simple Authentication and Security Layer

Apache Avro# 1.8.1 SASL Profile Table of contents 1 Introduction........................................................................................................................2

Add to Reading List

Source URL: avro.apache.org

Language: English - Date: 2016-05-21 18:02:26
20Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
UPDATE