Message authentication codes

Results: 232



#Item
21HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
22Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
23Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
24Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
25HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
26Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
27Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
28Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
29Hash function / Information retrieval / Artificial intelligence / Information science / Cryptography / Cryptographic hash function / Message authentication codes / Hashing / HMAC

############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:49:28
30Advanced Encryption Standard / Power analysis / Side channel attack / Microcontrollers / Stream ciphers / Message authentication codes / Joint Test Action Group / Field-programmable gate array / TI MSP430 / Cryptography / Electronic engineering / Electronics

In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-05-28 10:41:12
UPDATE