DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  HMAC

HMAC

  • IMPLEMENTATION and BENCHMARKING of PADDING UNITS and HMAC for SHA-3 CANDIDATES in FPGAS and ASICS by Ambarish Vyas a Thesis Subm

    IMPLEMENTATION and BENCHMARKING of PADDING UNITS and HMAC for SHA-3 CANDIDATES in FPGAS and ASICS by Ambarish Vyas a Thesis Subm

  • Lecture9.Pdf

    Lecture9.Pdf

  • Authenticated Key-Exchange: Protocols, Attacks, and Analyses

    Authenticated Key-Exchange: Protocols, Attacks, and Analyses

  • BLAKE2: Simpler, Smaller, Fast As MD5

    BLAKE2: Simpler, Smaller, Fast As MD5

  • Message Authentication Codes

    Message Authentication Codes

  • Deploying a New Hash Algorithm

    Deploying a New Hash Algorithm

  • FIPS 198, the Keyed-Hash Message Authentication Code (HMAC)

    FIPS 198, the Keyed-Hash Message Authentication Code (HMAC)

  • Ikev2 Security Association Configuration Mode Commands

    Ikev2 Security Association Configuration Mode Commands

  • On the Security of CTR + CBC-MAC NIST Modes of Operation – Additional CCM Documentation

    On the Security of CTR + CBC-MAC NIST Modes of Operation – Additional CCM Documentation

  • Security Analysis of BLAKE2's Modes of Operation

    Security Analysis of BLAKE2's Modes of Operation

  • SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions

    SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions

  • Message Authentication Codes

    Message Authentication Codes

  • Cryptanalysis of HMAC/NMAC-Whirlpool

    Cryptanalysis of HMAC/NMAC-Whirlpool

  • Message Franking Via Committing Authenticated Encryption∗

    Message Franking Via Committing Authenticated Encryption∗

  • The Hash Function BLAKE

    The Hash Function BLAKE

  • Theory and Practice Theory and Practice for Hash Functions

    Theory and Practice Theory and Practice for Hash Functions

  • AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?

    AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?

  • Performance of Message Authentication Codes for Secure Ethernet

    Performance of Message Authentication Codes for Secure Ethernet

Top View
  • Hash Function
  • EIGRP/SAF HMAC-SHA-256 Authentication
  • Hash Algorithms and MAC Algorithms [PDF]
  • Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
  • Guidelines on Cryptographic Algorithms Usage and Key Management
  • Ccsds 350.9-G-1
  • Lecture 5 (Cryptographic Hash Functions)
  • Cryptographic Hash Functions Message Authentication Digital Signatures Abstract
  • Keying Hash Functions for Message Authentication
  • FIPS 202, the SHA-3 Standard Overview and Recommendations
  • SNMP Authentication
  • Draft-Nayak-Tcp-Sha2-02 SHA-2 Algorithm for the TCP Authentication Option (TCP-AO)
  • Verified Correctness and Security of Openssl HMAC Lennart Beringer, Princeton University; Adam Petcher, Harvard University and MIT Lincoln Laboratory; Katherine Q
  • Cipher Suite Configuration Mode Commands
  • Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
  • Computer Security: Principles and Practice
  • High-Speed Encryption and Authentication


© 2024 Docslib.org    Feedback