Top View
- Hash Function
- EIGRP/SAF HMAC-SHA-256 Authentication
- Hash Algorithms and MAC Algorithms [PDF]
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Guidelines on Cryptographic Algorithms Usage and Key Management
- Ccsds 350.9-G-1
- Lecture 5 (Cryptographic Hash Functions)
- Cryptographic Hash Functions Message Authentication Digital Signatures Abstract
- Keying Hash Functions for Message Authentication
- FIPS 202, the SHA-3 Standard Overview and Recommendations
- SNMP Authentication
- Draft-Nayak-Tcp-Sha2-02 SHA-2 Algorithm for the TCP Authentication Option (TCP-AO)
- Verified Correctness and Security of Openssl HMAC Lennart Beringer, Princeton University; Adam Petcher, Harvard University and MIT Lincoln Laboratory; Katherine Q
- Cipher Suite Configuration Mode Commands
- Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- Computer Security: Principles and Practice
- High-Speed Encryption and Authentication
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- HMAC and CBC-MAC
- FIPS 140-2 and Other Cryptography Based Standards
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- The Security and Performance of the Galois/Counter Mode (GCM) of Operation (Full Version)
- Authenticated Encryption – a Hardware Designer's Perspective
- Message Authentication Using Hash Functions— the HMAC Construction
- Cryptographic Hash Functions
- Advanced Crypto
- Using Machxo3d ESB to Implement HMAC SHA256 Reference Design
- Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
- Cryptographic Hash Functions
- Entrust Nshield Hsmi
- Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
- Cryptanalysis of HMAC/NMAC-Whirlpool
- Message Authentication Codes Lecture Outline
- Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model Sonia Belaid, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre
- On the Security of the CCM Encryption Mode and of a Slight Variant
- The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
- Evaluation of Some Blockcipher Modes of Operation
- Hashing for Message Authentication
- Design, Implementation and Analysis of Keyed Hash Functions Based on Chaotic Maps and Neural Networks Nabil Abdoun
- Public-Key Cryptography and Message Authentication
- Cryptographic Hash Functions
- Introduction to the Hash Function As a Personal Data Pseudonymisation Technique
- Message Authentication Codes
- Design of an HMAC Co-Processor Unit Based on SHA-2 Family of Hash Functions
- New Generic Attacks Against Hash-Based Macs
- Message Authentication Codes (Macs)
- Sel-3021 Serial Encrypting Transceiver Is Immune to the Sha-1 Hashing Algorithm Compromise White Paper
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC*
- How to Implement SHA-1/HMAC Authentication for Bq26100 Michael Vega
- Recommendation for Applications Using Approved Hash Algorithms
- FIPS 140-2 Non-Proprietary Security Policy Quantanova Polymorphic Encryption Module
- FIPS PUB 198-1, the Keyed-Hash Message Authentication Code
- SHA-1 & HMAC OTP Frequently Asked Questions
- AES-CCM Encryption and Authentication Mode for 802.16
- Security Reductions of the Second Round SHA-3 Candidates
- Practical Electromagnetic Template Attack on HMAC
- Backdoored Hash Functions: Immunizing HMAC and HKDF
- Keying Hash Functions for Message Authentication
- FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, August 2015
- Authentication Weaknesses in GCM
- Configuring FIPS Mode
- Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2
- Security Policy Ntoken