First Page | Document Content | |
---|---|---|
Date: 2018-06-25 08:42:52Cryptography Public-key cryptography Post-quantum cryptography Hashing Hash-based cryptography XMSS Cryptographic hash function Merkle signature scheme Digital signature HMAC RSA Power analysis | Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:Add to Reading ListSource URL: kannwischer.euDownload Document from Source WebsiteFile Size: 3,19 MBShare Document on Facebook |
Introduction State-recovery for HMAC-HAIFA Short message attacksDocID: 1xVCI - View Document | |
Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay GueronDocID: 1uVDI - View Document | |
The HMAC construction: A decade later Ran Canetti IBM Research What is HMAC?DocID: 1udkA - View Document | |
Verified Correctness and Security of mbedTLS HMAC-DRBG Katherine Q. Ye Matthew Green Naphat SanguansinDocID: 1tHd3 - View Document | |
HRCF_HMAC_4 [Converted].epsDocID: 1tuZv - View Document |