Message authentication codes

Results: 232



#Item
31Message authentication codes / Internet / NTT Data / Authenticated encryption / Transport Layer Security / NTT Communications Corp / NTT DoCoMo / Outline of cryptography / Index of cryptography articles / Nippon Telegraph and Telephone / Economy of Japan / Cryptography

Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2015-02-03 21:03:02
32Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
33Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-12 10:35:54
34Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
35Advantage / Cryptography / Message authentication codes / Mihir Bellare

MESSAGE AUTHENTICATION CODES and PRF DOMAIN EXTENSION Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-30 11:36:13
36Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
37CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
38Chiang Mai / Block cipher modes of operation / Concrete security / Message authentication codes / Cryptography / Mihir Bellare / Phillip Rogaway

Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-09-21 13:38:39
39CBC-MAC / Block cipher modes of operation / Block cipher / Cryptographic hash function / One-key MAC / PMAC / Message authentication codes / Cryptography / CMAC

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-12 22:27:24
40RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
UPDATE