Message authentication

Results: 402



#Item
351Finite fields / Phillip Rogaway / PMAC / Fast Software Encryption / Index of cryptography articles / DES-X / Cryptography / Message authentication codes / Cryptographic hash function

John R. Black, Jr. Department of Computer Science 430 UCB

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2013-07-25 13:12:31
352Block ciphers / Stream ciphers / IAPM / Block cipher / Authenticated encryption / UMAC / CBC-MAC / Pseudorandom number generator / Index of cryptography articles / Cryptography / Message authentication codes / Block cipher modes of operation

Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-24 19:35:04
353Public-key cryptography / Authentication / Message authentication code / Extensible Authentication Protocol / Kerberos / Cryptography / Security / DNP3

7 SECURE AUTHENTICATION 7.1

Add to Reading List

Source URL: www.dnp.org

Language: English - Date: 2011-11-09 02:21:06
354Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
355Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
356Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
357Pennsylvania Avenue / Message authentication codes / Foggy Bottom / Ballston–MU / Farragut West / One-key MAC / Washington Metro / Orange Line / Silver Line

Effective[removed]How to use this timetable

Add to Reading List

Source URL: wmata.com

Language: English - Date: 2013-03-20 11:39:45
358CMAC / Cryptographic hash functions / Tiny Encryption Algorithm / VMAC / Padding / Block cipher modes of operation / Block cipher / Permutation / Universal hashing / Cryptography / Message authentication codes / Mathematics

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2003-12-03 13:40:14
359PMAC / Universal hashing / Applied mathematics / CMAC / Message authentication codes / One-key MAC / Block cipher

OMAC: One-Key CBC MAC Tetsu Iwata and Kaoru Kurosawa Department of Computer and Information Sciences,

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:38
360Block cipher / CBC-MAC / Advanced Encryption Standard / DEAL / Key size / CMAC / Cryptography / Message authentication codes / One-key MAC

Comparison of CBC MAC Variants and Comments on NIST’s Consultation Paper Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:36
UPDATE