Message authentication

Results: 402



#Item
131Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
132Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
133Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
134Post Office Protocol / Simple Mail Transfer Protocol / Internet Message Access Protocol / Secure Password Authentication / Message transfer agent / Gmail / Mail / Port / Email client / Email / Computer-mediated communication / Computing

Setting Up Microsoft® Outlook 2000 Technical Manual: Configuration and Setup Setting Up a POP3 or IMAP Email Account In Outlook, select Tools / E-mail Accounts. The Internet Connection Wizard will appear. (Note: Outlook

Add to Reading List

Source URL: www.bluesock.com

Language: English - Date: 2012-01-09 10:07:32
135Advanced Encryption Standard / Cryptographic software / FIPS 140-2 / FIPS 140 / Block cipher modes of operation / HMAC / Zeroisation / Crypto++ / AES implementations / Cryptography / Cryptography standards / Message authentication codes

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49
136Block ciphers / Galois/Counter Mode / AES instruction set / AES implementations / CPU cache / Tiny Encryption Algorithm / Serpent / Block cipher modes of operation / Block cipher / Cryptography / Advanced Encryption Standard / Message authentication codes

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
137Simple Mail Transfer Protocol / Extended SMTP / SMTP Authentication / MIME / MX record / Message transfer agent / Port / Internet Message Access Protocol / On-Demand Mail Relay / Email / Computer-mediated communication / Computing

Network Working Group Request for Comments: 2821 Obsoletes: 821, 974, 1869 Updates: 1123 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:37:55
138Post Office Protocol / Simple Mail Transfer Protocol / Internet Message Access Protocol / Secure Password Authentication / Gmail / Message transfer agent / Mail / Port / Email client / Email / Computer-mediated communication / Computing

Setting Up Microsoft® Outlook 98 Technical Manual: Configuration and Setup Setting Up a POP3 or IMAP Email Account 1. In Outlook, select Tools / Accounts. Document Updated: 2/07

Add to Reading List

Source URL: www.bluesock.com

Language: English - Date: 2012-01-09 10:07:25
139Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
140Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-03-13 22:33:48
UPDATE