Message authentication

Results: 402



#Item
361One-key MAC / Block cipher modes of operation / Permutation / Block cipher / CMAC / Message authentication codes / Combinatorics / Mathematics

Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:36
362Universal hashing / One-key MAC / Vector space / CMAC / Algebra / Mathematics / Message authentication codes

OMAC: One-Key CBC MAC — Addendum Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:34
363Hashing / NIST hash function competition / Message authentication codes / MD6 / Collision resistance / HMAC / Preimage attack / Hash function / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
364Symmetric-key algorithm / Key size / Cipher / Block ciphers / Message authentication codes / Poly1305-AES / Differential cryptanalysis / Cryptography / Advanced Encryption Standard / Ciphertext

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Add to Reading List

Source URL: www2.cs.uni-paderborn.de

Language: English - Date: 2004-07-08 11:01:15
365Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
366Key management / Cryptographic hash function / PKCS / Digital signature / Symmetric-key algorithm / Public key infrastructure / Block cipher / Microsoft CryptoAPI / Information security / Cryptography / Public-key cryptography / Message authentication codes

A Companion to User’s Guide to Cryptography and Standards Alexander W. Dent

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-03-20 11:00:00
367Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
368Cryptographic hash functions / HMAC / Key / Symmetric-key algorithm / SHA-2 / Ciphertext / Public-key cryptography / Index of cryptography articles / Book:Cryptography / Cryptography / Message authentication codes / Hashing

Everything you need to know about cryptography in 1 hour

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2011-07-30 14:49:49
369Atmel AVR / Symmetric-key algorithm / Padding / Advanced Encryption Standard / CMAC / Cipher / Key size / Cryptography / Message authentication codes / Key management

AVR411: Secure Rolling Code Algorithm for Wireless Link Features

Add to Reading List

Source URL: www.atmel.com

Language: English - Date: 2012-12-08 06:56:50
370Message authentication codes / Cipher / Data Authentication Algorithm / Residual block termination / Cryptography / Data Encryption Standard / Block cipher modes of operation

Microsoft Word - DVS 812r2 Proposed Revision of ANSI SCTE[removed]doc

Add to Reading List

Source URL: www.scte.org

Language: English - Date: 2008-06-12 15:59:34
UPDATE