Message authentication

Results: 402



#Item
1On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1  Departement d’Informatique

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1 Departement d’Informatique

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:23
2The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2015-10-04 23:56:24
    3SMAPs: Short Message Authentication Protocols Khaled Baqer1 , Johann Bezuidenhoudt2 , Ross Anderson1 , and Markus Kuhn1 1  Computer Laboratory, University of Cambridge, Cambridge, UK

    SMAPs: Short Message Authentication Protocols Khaled Baqer1 , Johann Bezuidenhoudt2 , Ross Anderson1 , and Markus Kuhn1 1 Computer Laboratory, University of Cambridge, Cambridge, UK

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2017-08-27 10:50:50
      4Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1  Department of Computer Science, University of Calgary, CA,

      Economically Optimal Variable Tag Length Message Authentication Reihaneh Safavi-Naini1 , Viliam Lis´y2 , and Yvo Desmedt3 1 Department of Computer Science, University of Calgary, CA,

      Add to Reading List

      Source URL: fc17.ifca.ai

      - Date: 2017-03-17 11:59:45
        5System Impact  Bugs · Security vulnerability · Authentication, message integrity, or system

        System Impact Bugs · Security vulnerability · Authentication, message integrity, or system

        Add to Reading List

        Source URL: wiki.allseenalliance.org

        - Date: 2015-06-11 15:04:29
          6Group Message Authentication Bartosz Przydatek1 and Douglas Wikstr¨ om2 1 Google Switzerland

          Group Message Authentication Bartosz Przydatek1 and Douglas Wikstr¨ om2 1 Google Switzerland

          Add to Reading List

          Source URL: www.nada.kth.se

          - Date: 2012-05-30 08:54:12
            7How to Configure Identical Credentials Configuration Guide

            How to Configure Identical Credentials Configuration Guide

            Add to Reading List

            Source URL: www.yubico.com

            Language: English - Date: 2016-06-22 18:25:41
            8Email Support Document Windows Mail ..................................................................................................................................................................  As a convenience to

            Email Support Document Windows Mail .................................................................................................................................................................. As a convenience to

            Add to Reading List

            Source URL: onlinedesigns.co.nz

            Language: English - Date: 2016-07-18 17:29:59
            9Zomerlust Systems Design Unit D11, Clareview Business Park

            Zomerlust Systems Design Unit D11, Clareview Business Park

            Add to Reading List

            Source URL: www.zsd.co.za

            Language: English - Date: 2016-08-12 12:36:51
            10Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

            Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

            Add to Reading List

            Source URL: keccak.noekeon.org

            Language: English - Date: 2013-02-27 15:26:40