Message authentication

Results: 402



#Item
51RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
52Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST

A New Approach to Practical Active-Secure Two-Party Computation 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-14 09:50:59
53Payment systems / Digital technology / Electronic money / Financial cryptography / Hypertext Transfer Protocol / Error message / Web standards / Technology / Computing / Cryptographic protocols / Electronic commerce

CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

Add to Reading List

Source URL: www.cavirtex.com

Language: English - Date: 2014-10-02 19:03:57
54Hashing / Data Encryption Standard / Finite fields / HMAC / Triple DES / Advanced Encryption Standard / SHA-2 / RSA / CMAC / Cryptography / Message authentication codes / Cryptographic hash functions

CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

Add to Reading List

Source URL: www.ecsec.jp

Language: English - Date: 2014-09-26 04:10:08
55

draft-ietf-appsawg-rfc7001bis-09 - Message Header Field for Indicating Message Authentication Status

Add to Reading List

Source URL: tools.ietf.org

- Date: 2015-05-20 05:16:59
    56

    1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:16
      57

            Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System     

      Add to Reading List

      Source URL: postsoftware.org

      Language: English - Date: 2014-01-17 23:49:27
        58

        Transport Research Arena 2014, Paris Hash Based Message Authentication in Vehicular Delayed Tolerant Networks Sara Bahamou, Jean-Marie Bonnin, Jong-Hyouk Lee,1 RSM Department, TELECOM Bretagne, France

        Add to Reading List

        Source URL: tra2014.traconference.eu

        Language: English - Date: 2015-01-12 10:28:21
          59Computing / Computer-mediated communication / Anti-spam techniques / Email spam / Spam / Whitelist / Open mail relay / Message transfer agent / Email authentication / Spamming / Email / Internet

          Using Early Results from the ‘spamHINTS’ Project to Estimate an ISP Abuse Team’s Task Richard Clayton Computer Laboratory, University of Cambridge JJ Thomson Avenue, CAMBRIDGE, CB3 0FD, United Kingdom

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2006-06-26 06:28:51
          60Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation

          Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2002-12-02 19:59:21
          UPDATE