Message authentication

Results: 402



#Item
231HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
232Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
233Vehicle Identification Number / Stool-or-mat / Vulture / Bread bun / Egyptian hieroglyphs / Cryptography / ID-based encryption

An extended abstract of this work appeared in the proceedings of CRYPTO[removed]This is the full version. (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-25 11:30:50
234Padding / Block cipher modes of operation / IPsec / Initialization vector / Block cipher / Stream cipher / Internet Key Exchange / Cryptanalysis / Message authentication code / Cryptography / Cryptographic protocols / Internet protocols

Side Channel Analyses of CBC Mode Encryption Arnold K. L. Yau Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-07-05 19:55:24
235

The Keyed-Hash Message Authentication Code Validation System (HMACVS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-23 10:16:18
    236Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

    Key Management Interoperability Protocol

    Add to Reading List

    Source URL: docs.oasis-open.org

    Language: English - Date: 2010-04-29 10:56:53
    237Block ciphers / IAPM / Block cipher / CBC-MAC / Tiny Encryption Algorithm / Authenticated encryption / Disk encryption theory / Cryptography / Block cipher modes of operation / Message authentication codes

    jutla-auth.PDF - Encryption Modes with Almost Free Message Integrity

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 15:25:51
    238Galois/Counter Mode / Authenticated encryption / Block cipher / Initialization vector / CBC-MAC / Ciphertext / Cipher / Block size / IEEE P1619 / Cryptography / Block cipher modes of operation / Message authentication codes

    The Galois/Counter Mode of Operation (GCM)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 15:23:54
    239Cryptographic protocols / Internet protocols / CCM mode / Block cipher / CBC-MAC / Authenticated encryption / IPsec / Cryptographic nonce / OCB mode / Cryptography / Block cipher modes of operation / Message authentication codes

    Submission to NIST: Counter with CBC-MAC (CCM) AES Mode of Operation

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 14:54:44
    240Message authentication codes / Initialization vector / Block cipher / Block size / Authenticated encryption / Crypto++ / Index of cryptography articles / CBC-MAC / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

    04snlntTLraelkFoldernt_Auth_EncTAES-Spec.DVI

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-05 15:11:01
    UPDATE