<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Hashing / GOST standards / Message authentication codes / HMAC / GOST / SHA-2 / Hash function / Streebog / SHA-1 / Checksum
Date: 2018-06-14 07:12:35
Cryptography
Cryptographic hash functions
Hashing
GOST standards
Message authentication codes
HMAC
GOST
SHA-2
Hash function
Streebog
SHA-1
Checksum

Introduction State-recovery for HMAC-HAIFA Short message attacks

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 408,72 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Message authentication codes / Error detection and correction / Financial cryptography / Digital signature / Blind signature

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1 Departement d’Informatique

DocID: 1xUpG - View Document

Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

DocID: 1qHZI - View Document

Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

DocID: 1qvnb - View Document

Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

DocID: 1pZbW - View Document

Stream ciphers / Data Encryption Standard / Message authentication codes / Cryptography / VEST / Authenticated encryption / Py / DEAL / Index of cryptography articles

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1oJoZ - View Document