Message authentication

Results: 402



#Item
51CS255: Cryptography and Computer Security  Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
52A New Approach to Practical Active-Secure Two-Party Computation 1 1

A New Approach to Practical Active-Secure Two-Party Computation 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-14 09:50:59
53CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

Add to Reading List

Source URL: www.cavirtex.com

Language: English - Date: 2014-10-02 19:03:57
54CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

Add to Reading List

Source URL: www.ecsec.jp

Language: English - Date: 2014-09-26 04:10:08
55draft-ietf-appsawg-rfc7001bis-09 - Message Header Field for Indicating Message Authentication Status

draft-ietf-appsawg-rfc7001bis-09 - Message Header Field for Indicating Message Authentication Status

Add to Reading List

Source URL: tools.ietf.org

- Date: 2015-05-20 05:16:59
    561997 Paper 7 Question 9  Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

    1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2014-06-09 10:17:16
      57      Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System     

            Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System     

      Add to Reading List

      Source URL: postsoftware.org

      Language: English - Date: 2014-01-17 23:49:27
        58Transport Research Arena 2014, Paris  Hash Based Message Authentication in Vehicular Delayed Tolerant Networks Sara Bahamou, Jean-Marie Bonnin, Jong-Hyouk Lee,1 RSM Department, TELECOM Bretagne, France

        Transport Research Arena 2014, Paris Hash Based Message Authentication in Vehicular Delayed Tolerant Networks Sara Bahamou, Jean-Marie Bonnin, Jong-Hyouk Lee,1 RSM Department, TELECOM Bretagne, France

        Add to Reading List

        Source URL: tra2014.traconference.eu

        Language: English - Date: 2015-01-12 10:28:21
          59Using Early Results from the ‘spamHINTS’ Project to Estimate an ISP Abuse Team’s Task Richard Clayton Computer Laboratory, University of Cambridge JJ Thomson Avenue, CAMBRIDGE, CB3 0FD, United Kingdom

          Using Early Results from the ‘spamHINTS’ Project to Estimate an ISP Abuse Team’s Task Richard Clayton Computer Laboratory, University of Cambridge JJ Thomson Avenue, CAMBRIDGE, CB3 0FD, United Kingdom

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2006-06-26 06:28:51
          60Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

          Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2002-12-02 19:59:21