Showing 1 - 20 results of 34 for search '"HMAC"', query time: 0.10s Refine Results
  1. 1
  2. 2
    “… υλικού VHDL) ενός πλήρως pipeline CBC-HMAC συστήματος που εξασφαλίζει τις κρυπτογραφικές υπηρεσίες της…”
    Get full text
    Thesis
  3. 3
    “… κατακερματισμού, υλοποιήσαμε δύο παραλλαγές αλγόριθμου HMAC. Η πρώτη βασίζεται στον αλγόριθμο MD5 και η δεύτερη…”
    Get full text
    Thesis
  4. 4
    “… όπως ο AES-128, RSA, SHA-256 και HMAC-SHA256. Η περιγραφή του πρωτοκόλλου όσο και των κρυπτογραφικών…”
    Get full text
  5. 5
    “… σχεδιάστηκαν οι, απαιτητικοί σε χρόνο, κρυπτογραφικοί πυρήνες του συστήματος, CBC-AES-128 και HMAC-SHA1-96…”
    Get full text
    Thesis
  6. 6
    Published 2008
    Table of Contents: “… Tradeoffs for Permutation-Based Hashing -- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2013
    Table of Contents: “… at Any Key-Length -- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC -- New…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2006
    Table of Contents: “… -- On the Higher Order Nonlinearities of Algebraic Immune Functions -- New Proofs for NMAC and HMAC: Security…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2006
    Table of Contents: “… -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2009
    Table of Contents: “…Hash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2004
    Table of Contents: “…, and the HMAC-Construction -- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2006
    Table of Contents: “… -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2007
    Table of Contents: “…Cryptanalysis I -- Practical Cryptanalysis of SFLASH -- Full Key-Recovery Attacks on HMAC/NMAC-MD4…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2007
    Table of Contents: “… Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2014
    Table of Contents: “… -- Montgomery Multiplication Using Vector Instructions -- Improved Single-Key Distinguisher on HMAC-MD5 and Key…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 2012
    Table of Contents: “… Again? (In)Differentiability Results for H2 and HMAC.- New Preimage Attacks against Reduced SHA-1…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2009
    Table of Contents: “…-Attacks Using Isogeny Volcanoes -- Security Analysis of DRBG Using HMAC in NIST SP 800-90 -- Wireless…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
    Published 2008
    Table of Contents: “… -- Security of NMAC and HMAC Based on Non-malleability -- Aggregate Message Authentication Codes -- Improved…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 20
    Published 2008
    Table of Contents: “…-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL -- Cryptanalysis of LASH -- A (Second) Preimage Attack…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search