11![YubiKey VIP • YubiKey VIP offers strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button and is specially programmed to work with Symantec VIP • Works instantly with no need t YubiKey VIP • YubiKey VIP offers strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button and is specially programmed to work with Symantec VIP • Works instantly with no need t](https://www.pdfsearch.io/img/30a32737bf04414e987816c800fe69bd.jpg) | Add to Reading ListSource URL: www.yubico.comLanguage: English - Date: 2016-02-04 14:54:44
|
---|
12![YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi](https://www.pdfsearch.io/img/79db904f8dff52a685e57cb0c985e2d8.jpg) | Add to Reading ListSource URL: www.yubico.comLanguage: English - Date: 2016-02-04 14:54:42
|
---|
13![Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo1 , Yu Sasaki2 , Lei Wang1 , Meiqin Wang3 ⋆ , and Long Wen3 1 3 Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo1 , Yu Sasaki2 , Lei Wang1 , Meiqin Wang3 ⋆ , and Long Wen3 1 3](https://www.pdfsearch.io/img/869d0876be044ad15d1fed1141fe869e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-02-02 06:21:15
|
---|
14![The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a](https://www.pdfsearch.io/img/3882b89efd73b7ff6479748170078068.jpg) | Add to Reading ListSource URL: pub.ist.ac.atLanguage: English - Date: 2014-07-24 05:23:52
|
---|
15![Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan. Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan.](https://www.pdfsearch.io/img/61cb33b3c7f2c22f02dd48c26e915924.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-02-23 10:32:52
|
---|
16![Preliminary Specification X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules EL PR IM Preliminary Specification X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules EL PR IM](https://www.pdfsearch.io/img/f899ec36590ea69bc710c9b040fd02ed.jpg) | Add to Reading ListSource URL: pubs.opengroup.orgLanguage: English - Date: 2003-01-28 06:23:48
|
---|
17![The HMAC construction: A decade later Ran Canetti IBM Research
What is HMAC? The HMAC construction: A decade later Ran Canetti IBM Research
What is HMAC?](https://www.pdfsearch.io/img/1b41676a319c92c9859c52f04569cb89.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2008-10-06 08:08:14
|
---|
18![CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS](https://www.pdfsearch.io/img/3d84c8a66ef1e00d4fce53b6bbaab84c.jpg) | Add to Reading ListSource URL: www.ecsec.jpLanguage: English - Date: 2014-09-26 04:10:08
|
---|
19![Microsoft PowerPoint - preneel_enisa08v4.ppt Microsoft PowerPoint - preneel_enisa08v4.ppt](https://www.pdfsearch.io/img/0e50e5647771f2c9c87ec6b5a221bcb2.jpg) | Add to Reading ListSource URL: www.nis-summer-school.euLanguage: English - Date: 2008-10-20 04:40:05
|
---|
20![draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3 draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3](https://www.pdfsearch.io/img/238b9655bf877853afa8ddb3c365970a.jpg) | Add to Reading ListSource URL: tools.ietf.org- Date: 2015-04-22 05:03:32
|
---|