Message authentication

Results: 402



#Item
341Cryptographic hash function / Cipher / Password / Message authentication code / Public-key cryptography / Index of cryptography articles / Stream cipher / Cryptography / Block cipher / Key

2007 Paper 3 Question 9 Introduction to Security (a) You have received a shipment of hardware random-number generators, each of which can output one 128-bit random number every 10 milliseconds. You suspect that one of t

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:45
342Block cipher / Public-key cryptography / CMAC / Poly1305-AES / Cryptography / Message authentication codes / Cryptographic hash function

2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:43
343Secure communication / IEEE P1619 / Block cipher modes of operation / Cipher / Message authentication codes

2003 Paper 3 Question 9 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:38
344Privacy / Radio-frequency identification / Wireless / Technology / Computing / ISO/IEC / Password authentication protocol / ISO/IEC 18000-3 / Message authentication codes / Cryptography / Automatic identification and data capture

Secure UHF Tags with Strong Cryptography Development of ISO/IEC[removed]Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller and Martin Seysen Giesecke & Devrient GmbH, Prinzrege

Add to Reading List

Source URL: www.rfid-handbook.de

Language: English - Date: 2013-04-26 03:48:58
345Advanced Encryption Standard / Message authentication codes / Hashing / SecurID / ICE / VEST / Hash function / Lookup table / Hamming weight / Cryptography / Cryptographic hash functions / Stream ciphers

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yin2 1 Macquarie University, Computing Department, NSW 2109 Australia, [removed],

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:21:08
346Block cipher modes of operation / CCM mode / Data Encryption Standard / Verilog / VHDL / Message authentication codes / Cryptography / Hardware description languages / Advanced Encryption Standard

CCM1 Generic CCM AES Cores

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 22:58:28
347Data Encryption Standard / Verilog / Message authentication codes / Galois/Counter Mode / CCM mode / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

GCE1 Core AES-GCM/CCM/CCM*/EAX’ Core

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 22:59:04
348Cryptography standards / IEEE 802.1AE / Data Encryption Standard / Message authentication codes / IEEE 802.1 / Galois/Counter Mode / Cryptography / IEEE 802 / Advanced Encryption Standard

GCM1 Core 802.1ae (MACSec) GCM/AES Core

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 23:01:15
349Stream ciphers / Message authentication codes / Electronic engineering / 3GPP / Semiconductor intellectual property core

ZUC1 Ultra-Compact 3GPP Cipher Core

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 23:00:31
350NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions

The K SHA-3 submission

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
UPDATE