Message authentication

Results: 402



#Item
241Block cipher modes of operation / CMAC / Key Wrap / Block cipher / Ciphertext / Triple DES / Advantage / Cryptography / Message authentication codes / Finite fields

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
242Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes

CCM Use Requirements Specification.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:56:29
243Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
244HOTP / Computing / Message authentication codes / Cryptographic hash functions / One-time password / HMAC / Password / SHA-1 / Two-factor authentication / Cryptography / Internet protocols / Security

http://www.ietf.org/rfc/rfc4226.txt

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:04
245Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
246Email client / Internet Message Access Protocol / SMTP Authentication / Transport Layer Security / Simple Mail Transfer Protocol / Comparison of webmail providers / Email / Computer-mediated communication / Computing

NCMail-IMAP-SMTP-Auth-Setup-Guide-V1.0

Add to Reading List

Source URL: www.ncmail.net

Language: English - Date: 2008-01-10 08:46:32
247Email / Technology / Internet / Payment systems / Electronics / Fraud / Password / International call / Transaction authentication number

If anyone has had problems with their MCI Federal calling card while overseas- you will want to read the trailing message to get it corrected. *this is especially important regarding the issue that some people have wit

Add to Reading List

Source URL: www.fs.fed.us

Language: English - Date: 2008-01-10 18:04:12
248Cryptographic hash functions / Finite fields / Cryptography standards / SHA-2 / Key generation / HMAC / SHA-1 / Key Wrap / Galois/Counter Mode / Cryptography / Message authentication codes / Cryptographic software

Frequently Asked Questions For the Cryptographic Algorithm Validation Program Concerning the Validation of Cryptographic Algorithm Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 16:11:18
249Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
250Message authentication codes / Cryptographic software / Key Wrap / Cryptographic hash function / Triple DES / Key generation / Digital signature / CMAC / Key size / Cryptography / Key management / Hashing

NIST’s Cryptographic Toolkit (of Standards and Recommendations)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:12:10
UPDATE