Message authentication codes

Results: 232



#Item
51Block ciphers / Galois/Counter Mode / AES instruction set / AES implementations / CPU cache / Tiny Encryption Algorithm / Serpent / Block cipher modes of operation / Block cipher / Cryptography / Advanced Encryption Standard / Message authentication codes

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
52Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
53Hashing / Message authentication codes / Search algorithms / Preimage attack / HMAC / Collision resistance / MD5 / CBC-MAC / Universal hashing / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
54Unexploded ordnance / Message authentication codes / CMAC / Constellation Brands – Marvin Sands Performing Arts Center

CMAC OPERATIONAL SUMMARY PROGRESS REPORT 1992 UP TO JUN‐2011 Responsed Small Arms (kg)

Add to Reading List

Source URL: cmac.gov.kh

Language: English - Date: 2011-09-19 06:47:22
55Message authentication codes / Cryptographic protocols / Internet security / Secure Shell / Security service / Encryption / Password / Non-repudiation / AKA / Cryptography / Computer network security / Public-key cryptography

Encryption and Security Tutorial Peter Gutmann University of Auckland http://www.cs.auckland.ac.nz/~pgut001 Security Requirements

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 12:55:08
56Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
57KMAC / SHA-2 / CMAC / Computing / Internet protocols / Computer programming / Mathematics / Message authentication codes / Hashing / HMAC

SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:52:10
58Message authentication codes / Cryptography / Ciphertext indistinguishability

Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK Krzysztof Pietrzak

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
59Computing / Transparent Data Encryption / Cross-platform software / Message authentication codes / Oracle Corporation / Oracle Database / HMAC / Vormetric / Cryptography standards / Cryptography / Software / Disk encryption

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
60Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
UPDATE