DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» UMAC
UMAC
The Software Performance of Authenticated-Encryption Modes 1
Patent-Free Authenticated-Encryption As Fast As OCB
Symmetric Key Cryptography PQCRYPTO Summer School on Post-Quantum Cryptography 2017
Reducing the Impact of Dos Attacks on Endpoint IP Security
Implementation of Hash Function for Cryptography (Rsa Security)
Authenticated Ciphers D. J. Bernstein University of Illinois at Chicago
Message Franking Via Committing Authenticated Encryption∗
Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector
SECURE ALGORITHMS Minding Your MAC Algorithms?
FIPS 140-2 Non-Proprietary Security Policy
Development of Authentication Codes of Messages on the Basis of Umac with Crypto-Code Mceliece’S Scheme
Crypto 101 Lvh
RIV for Robust Authenticated Encryption
UMAC: Fast and Secure Message Authentication
Regular and Almost Universal Hashing: an Efficient Implementation
Hashing Techniques: a Survey and Taxonomy
Breaking and Repairing GCM Security Proofs⋆
Algorithms, Key Size and Parameters Report – 2014
Top View
Easychair Preprint Practical UMAC Algorithm on Hybrid Crypto-Code
Lightweight Macs from Universal Hash Functions Sébastien Duval, Gaëtan Leurent
UMAC: Fast and Secure Message Authentication
UMAC: Fast and Secure Message Authentication
Tweakable Block Ciphers
CNS Lecture 3 - 2
Software-Optimized Universal Hashing and Message Authentication
Message Authentication on 64-Bit Architectures
Arxiv:1609.09840V2 [Cs.DS] 18 Oct 2016 Are Infrequent
High-Speed Encryption and Authentication
Analysis and Improvement of Message Authentication Codes in Openssh
LNCS 3557, Pp
Security Policy
Evaluation of the Computational Complexity of Some Hash Functions
High Speed FPGA Implementation of Cryptographic Hash Function
A Surfeit of SSH Cipher Suites
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1?
Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
Authenticated Encryption: How Reordering Can Impact Performance
MAC Algorithm Configuration
Getting Started
Authenticated Encryption
Message Authentication on 64-Bit Architectures
Ccsds Cryptographic Algorithms
Chaskey: a Lightweight MAC Algorithm for Microcontrollers⋆
Evaluation of Some Blockcipher Modes of Operation
Design, Implementation and Analysis of Keyed Hash Functions Based on Chaotic Maps and Neural Networks Nabil Abdoun
Breaking and Repairing GCM Security Proofs
Report on the Second Modes of Operation Workshop [August 2001]
Authenticated Encryption 1 Introduction
The Poly1305-AES Message-Authentication Code
Hash Functions: Part 2 Macs & Authenticated Ciphers Required Reading
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
Siphash: a Fast Short-Input PRF
Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths
SHA-3 Proposal BLAKE∗