Message authentication

Results: 402



#Item
141Hashing / Message authentication codes / Search algorithms / Preimage attack / HMAC / Collision resistance / MD5 / CBC-MAC / Universal hashing / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
142Unexploded ordnance / Message authentication codes / CMAC / Constellation Brands – Marvin Sands Performing Arts Center

CMAC OPERATIONAL SUMMARY PROGRESS REPORT 1992 UP TO JUN‐2011 Responsed Small Arms (kg)

Add to Reading List

Source URL: cmac.gov.kh

Language: English - Date: 2011-09-19 06:47:22
143Simple Mail Transfer Protocol / Extended SMTP / MX record / Post Office Protocol / SMTP Authentication / Message transfer agent / Internet Message Access Protocol / Port / Local Mail Transfer Protocol / Email / Computer-mediated communication / Computing

Network Working Group Request for Comments: 5321 Obsoletes: 2821 Updates: 1123 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-10-01 19:14:40
144Computer-mediated communication / Computing / Spamming / Sender Policy Framework / Sender ID / Simple Mail Transfer Protocol / Internet security / Message transfer agent / Anti-spam techniques / Spam filtering / Email authentication / Email

Microsoft Word - Sender Policy Framework - new template version Sep.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:39:45
145Message authentication codes / Cryptographic protocols / Internet security / Secure Shell / Security service / Encryption / Password / Non-repudiation / AKA / Cryptography / Computer network security / Public-key cryptography

Encryption and Security Tutorial Peter Gutmann University of Auckland http://www.cs.auckland.ac.nz/~pgut001 Security Requirements

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 12:55:08
146Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
147KMAC / SHA-2 / CMAC / Computing / Internet protocols / Computer programming / Mathematics / Message authentication codes / Hashing / HMAC

SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:52:10
148Message authentication codes / Cryptography / Ciphertext indistinguishability

Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK Krzysztof Pietrzak

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
149Computing / Transparent Data Encryption / Cross-platform software / Message authentication codes / Oracle Corporation / Oracle Database / HMAC / Vormetric / Cryptography standards / Cryptography / Software / Disk encryption

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
150Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
UPDATE