Message authentication

Results: 402



#Item
1Cryptography / Public-key cryptography / Message authentication codes / Error detection and correction / Financial cryptography / Digital signature / Blind signature

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1 Departement d’Informatique

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:23
2

The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2015-10-04 23:56:24
    3

    SMAPs: Short Message Authentication Protocols Khaled Baqer1 , Johann Bezuidenhoudt2 , Ross Anderson1 , and Markus Kuhn1 1 Computer Laboratory, University of Cambridge, Cambridge, UK

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2017-08-27 10:50:50
      4

      Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1 Department of Computer Science, University of Calgary, CA,

      Add to Reading List

      Source URL: fc17.ifca.ai

      - Date: 2017-03-17 11:59:45
        5

        System Impact Bugs · Security vulnerability · Authentication, message integrity, or system

        Add to Reading List

        Source URL: wiki.allseenalliance.org

        - Date: 2015-06-11 15:04:29
          6

          Group Message Authentication Bartosz Przydatek1 and Douglas Wikstr¨ om2 1 Google Switzerland

          Add to Reading List

          Source URL: www.nada.kth.se

          - Date: 2012-05-30 08:54:12
            7Computer access control / Cryptography / Software / Computer security / YubiKey / Hash-based message authentication code / Double-click / Configure script / Authentication

            How to Configure Identical Credentials Configuration Guide

            Add to Reading List

            Source URL: www.yubico.com

            Language: English - Date: 2016-06-22 18:25:41
            8Computing / Email / Software / Webmail / Simple Mail Transfer Protocol / Email client / Gmail / Message transfer agent / Mail / Post Office Protocol / SMTP Authentication / Internet Message Access Protocol

            Email Support Document Windows Mail .................................................................................................................................................................. As a convenience to

            Add to Reading List

            Source URL: onlinedesigns.co.nz

            Language: English - Date: 2016-07-18 17:29:59
            9Email / Computing / Cyberspace / Simple Mail Transfer Protocol / Open mail relay / Internet Message Access Protocol / Message transfer agent / SMTP Authentication / Webmail / Post Office Protocol / Mailbox provider / Gmail

            Zomerlust Systems Design Unit D11, Clareview Business Park

            Add to Reading List

            Source URL: www.zsd.co.za

            Language: English - Date: 2016-08-12 12:36:51
            10Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

            Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

            Add to Reading List

            Source URL: keccak.noekeon.org

            Language: English - Date: 2013-02-27 15:26:40
            UPDATE