-
1
-
2by Θανασούλης, Βασίλης“… υλικού VHDL) ενός πλήρως pipeline CBC-HMAC συστήματος που εξασφαλίζει τις κρυπτογραφικές υπηρεσίες της…”
Published 2010
Get full text
Thesis -
3by Κλαουδάτος, Νικόλαος“… κατακερματισμού, υλοποιήσαμε δύο παραλλαγές αλγόριθμου HMAC. Η πρώτη βασίζεται στον αλγόριθμο MD5 και η δεύτερη…”
Published 2011
Get full text
Thesis -
4by Αναστάσης, Αναστασίου“… όπως ο AES-128, RSA, SHA-256 και HMAC-SHA256. Η περιγραφή του πρωτοκόλλου όσο και των κρυπτογραφικών…”
Published 2022
Get full text
-
5by Γκίτσας, Γεώργιος“… σχεδιάστηκαν οι, απαιτητικοί σε χρόνο, κρυπτογραφικοί πυρήνες του συστήματος, CBC-AES-128 και HMAC-SHA1-96…”
Published 2014
Get full text
Thesis -
6Published 2008Table of Contents: “… Tradeoffs for Permutation-Based Hashing -- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2013Table of Contents: “… at Any Key-Length -- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC -- New…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2006Table of Contents: “… -- On the Higher Order Nonlinearities of Algebraic Immune Functions -- New Proofs for NMAC and HMAC: Security…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2006Table of Contents: “… -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2009Table of Contents: “…Hash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2004Table of Contents: “…, and the HMAC-Construction -- Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2006Table of Contents: “… -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2007Table of Contents: “…Cryptanalysis I -- Practical Cryptanalysis of SFLASH -- Full Key-Recovery Attacks on HMAC/NMAC-MD4…”
Full Text via HEAL-Link
Electronic eBook -
14
-
15Published 2007Table of Contents: “… Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2014Table of Contents: “… -- Montgomery Multiplication Using Vector Instructions -- Improved Single-Key Distinguisher on HMAC-MD5 and Key…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2012Table of Contents: “… Again? (In)Differentiability Results for H2 and HMAC.- New Preimage Attacks against Reduced SHA-1…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2009Table of Contents: “…-Attacks Using Isogeny Volcanoes -- Security Analysis of DRBG Using HMAC in NIST SP 800-90 -- Wireless…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2008Table of Contents: “… -- Security of NMAC and HMAC Based on Non-malleability -- Aggregate Message Authentication Codes -- Improved…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2008Table of Contents: “…-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL -- Cryptanalysis of LASH -- A (Second) Preimage Attack…”
Full Text via HEAL-Link
Electronic eBook