|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 134 occurrences of 78 keywords
|
|
|
Results
Found 201 publication records. Showing 201 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
182 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit.  |
INDOCRYPT  |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
130 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).  |
SCN  |
2006 |
DBLP DOI BibTeX RDF |
|
114 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.  |
ICICS  |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
114 | Kan Yasuda |
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.  |
ACISP  |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function |
114 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.  |
INDOCRYPT  |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
114 | Kan Yasuda |
HMAC without the "Second" Key.  |
ISC  |
2009 |
DBLP DOI BibTeX RDF |
Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix |
105 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.  |
EUROCRYPT  |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
105 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
105 | Kerstin Lemke, Kai Schramm, Christof Paar |
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.  |
CHES  |
2004 |
DBLP DOI BibTeX RDF |
Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6 |
105 | Mohannad Najjar, Firas Najjar |
d-HMAC Dynamic HMAC function.  |
DepCoS-RELCOMEX  |
2006 |
DBLP DOI BibTeX RDF |
|
99 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance.  |
CRYPTO  |
2006 |
DBLP DOI BibTeX RDF |
|
99 | Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu |
An HMAC processor with integrated SHA-1 and MD5 algorithms.  |
ASP-DAC  |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Magnus Nyström |
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512.  |
RFC  |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.  |
Selected Areas in Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
83 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.  |
ACISP  |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
83 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
|
77 | Sarvar Patel |
An Efficient MAC for Short Messages.  |
Selected Areas in Cryptography  |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS.  |
AsiaCCS  |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
74 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.  |
EUROCRYPT  |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
74 | Shoichi Hirose |
Security Analysis of DRBG Using HMAC in NIST SP 800-90.  |
WISA  |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-90, pseudorandom bit generator, HMAC, pseudorandom function |
68 | Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane |
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.  |
WISA  |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Scott G. Kelly, Sheila Frankel |
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec.  |
RFC  |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Vivek Jain 0001, Anurag Gupta, Dharma P. Agrawal |
On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas.  |
IEEE Trans. Parallel Distributed Syst.  |
2008 |
DBLP DOI BibTeX RDF |
Concurrent Packet Receptions, Multiple Beam Smart Antennas, Medium Access Control, Wireless Mesh Networks, Deafness |
62 | Kan Yasuda |
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs.  |
ICISC  |
2008 |
DBLP DOI BibTeX RDF |
imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension |
62 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.  |
ATC  |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform.  |
DAC  |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
59 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.  |
AFRICACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
59 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.  |
FSE  |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
52 | Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette |
Practical Electromagnetic Template Attack on HMAC.  |
CHES  |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis.  |
AICCSA  |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.  |
ASIACRYPT  |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Benjamin Arazi |
Message Authentication in Computationally Constrained Environments.  |
IEEE Trans. Mob. Comput.  |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Bum-Gon Choi, Woo Jin Jung, Min Young Chung, Byung Jun Ahn |
Hybrid Medium Access Control Scheme to Enhance the Performance of IEEE 802.11s Wireless Mesh Networks.  |
ICCSA (1)  |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Marcio Juliato, Catherine H. Gebotys |
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals.  |
ReConFig  |
2009 |
DBLP DOI BibTeX RDF |
Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction |
43 | Hojin Choi, Seog Chung Seo |
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment.  |
IEEE Access  |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Hojin Choi, Seog Chung Seo |
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments.  |
WISA  |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki, Lei Wang 0031 |
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks.  |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.  |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki, Lei Wang 0031 |
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks.  |
SCN  |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.  |
ICETE (Selected Papers)  |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Justin S. Kapp |
Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128.  |
RFC  |
1998 |
DBLP DOI BibTeX RDF |
|
43 | P. Cheng, Robert Glenn |
Test Cases for HMAC-MD5 and HMAC-SHA-1.  |
RFC  |
1997 |
DBLP DOI BibTeX RDF |
|
37 | Kan Yasuda |
Boosting Merkle-Damgård Hashing for Message Authentication.  |
ASIACRYPT  |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC |
37 | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin |
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.  |
CRYPTO  |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood |
Scalable and efficient key management for heterogeneous sensor networks.  |
J. Supercomput.  |
2008 |
DBLP DOI BibTeX RDF |
Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks |
31 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs.  |
ACISP  |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
31 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.  |
WISA  |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
31 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
An FPGA Design of a Unified Hash Engine for IPSec Authentication.  |
IWSOC  |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation.  |
ICDS  |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
22 | Sukriti Bhattacharya, Agostino Cortesi |
A Generic Distortion Free Watermarking Technique for Relational Databases.  |
ICISS  |
2009 |
DBLP DOI BibTeX RDF |
Database Watermarking, Abstract Interpretation, Galois Connection, HMAC |
22 | Xiangyang Liu, Hongtao Lu |
Fragile Watermarking Schemes for Tamperproof Web Pages.  |
ISNN (2)  |
2008 |
DBLP DOI BibTeX RDF |
Keyed-Hashing for Message Authentication(HMAC), Non-negative Sparse Coding(NNSC), Hash, Fragile watermark |
22 | Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt |
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.  |
AsiaCCS  |
2007 |
DBLP DOI BibTeX RDF |
DEMEM, DRETA, delayed key disclosure, forwarded message, one-way key chain, previous forwarder, validation message, MANET, AODV, OLSR, HMAC |
22 | Marguerite Fayçal, Ahmed Serhrouchni |
CAP: A Context-Aware Peer-to-Peer System.  |
OTM Workshops (2)  |
2007 |
DBLP DOI BibTeX RDF |
HKey, VDHT, P2P, DHT, HMAC |
22 | P. Hari Kumar, G. S. Anandha Mala |
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment.  |
J. Supercomput.  |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer |
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2.  |
IACR Trans. Cryptogr. Hardw. Embed. Syst.  |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata |
When Messages are Keys: Is HMAC a dual-PRF?  |
IACR Cryptol. ePrint Arch.  |
2023 |
DBLP BibTeX RDF |
|
22 | Lukas Vlasak, Antoine Bouvet, Sylvain Guilley |
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2.  |
INDOCRYPT (1)  |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata |
When Messages Are Keys: Is HMAC a Dual-PRF?  |
CRYPTO (3)  |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Shimaa A. Abdel Hakeem, HyungWon Kim 0001 |
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.  |
Sensors  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Haythem Hayouni |
E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs.  |
EAI Endorsed Trans. Mob. Commun. Appl.  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher |
A computationally efficient HMAC-based authentication scheme for network coding.  |
Telecommun. Syst.  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Frank Schuhmacher |
Canonical DPA Attack on HMAC-SHA1/SHA2.  |
COSADE  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Cesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta 0001, Ladislau Bölöni |
Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC).  |
IGSC  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham |
High-performance Multi-function HMAC-SHA2 FPGA Implementation.  |
NEWCAS  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Zhengjian Duan |
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm.  |
ML4CS (1)  |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.  |
IACR Cryptol. ePrint Arch.  |
2021 |
DBLP BibTeX RDF |
|
22 | Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher |
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification.  |
J. Syst. Archit.  |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer |
First Full-Fledged Side Channel Attack on HMAC-SHA-2.  |
COSADE  |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh |
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding.  |
FCS  |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.  |
CRYPTO (1)  |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li |
A bandwidth efficient HMAC-based authentication scheme for network coding.  |
J. Inf. Secur. Appl.  |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Xin Jin, Yong Xiao, Shiqi Li, Suying Wang |
Deep Learning-based Side Channel Attack on HMAC SM3.  |
Int. J. Interact. Multim. Artif. Intell.  |
2020 |
DBLP BibTeX RDF |
|
22 | Andrea Visconti, Federico Gorla |
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2.  |
IEEE Trans. Dependable Secur. Comput.  |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Gal Benmocha, Eli Biham, Stav Perle |
Unintended Features of APIs: Cryptanalysis of Incremental HMAC.  |
SAC  |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld |
HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security.  |
CANS  |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tao Zhou, Yongxin Zhu 0001, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng |
Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection.  |
SmartCloud  |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Sundar Srinivasan, K. B. ShivaKumar, Mohammad Muazzam |
HMAC-RSA: A security mechanism in cognitive radio for enhancing the security in a radio cognitive system.  |
J. Intell. Fuzzy Syst.  |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Russell Housley |
Algorithm Identifiers for the HMAC-based Extract-and-Expand Key Derivation Function (HKDF).  |
RFC  |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Amine Erroutbi, Adnane El Hanjri, Abderrahim Sekkaki |
Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes.  |
ISC2  |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sebastian Litzinger, Oliver Körber, Jörg Keller 0001 |
Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms.  |
HPCS  |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures.  |
IPSJ Trans. Syst. LSI Des. Methodol.  |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Formal analysis of HMAC authorisation in the TPM2.0 specification.  |
IET Inf. Secur.  |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yonghui Chen, Cheng Zhang 0007, Wei Li 0092, Tingsong Chen, Mingwu Zhang |
A publicly verifiable network coding scheme with null-space HMAC.  |
Int. J. Intell. Inf. Database Syst.  |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Marc Fischlin, Christian Janson, Sogol Mazaheri |
Backdoored Hash Functions: Immunizing HMAC and HKDF.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
22 | Andrea Visconti, Federico Gorla |
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
22 | Marc Fischlin, Christian Janson, Sogol Mazaheri |
Backdoored Hash Functions: Immunizing HMAC and HKDF.  |
CSF  |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao |
HSATA: Improved SATA Protocol with HMAC.  |
ICCCN  |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Mohannad Najjar |
Using Improved d-HMAC for Password Storage.  |
Comput. Inf. Sci.  |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Lihui Lin, Kaizhi Chen, Shangping Zhong |
Enhancing the Session Security of Zen Cart based on HMAC-SHA256.  |
KSII Trans. Internet Inf. Syst.  |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
Verified Correctness and Security of mbedTLS HMAC-DRBG.  |
CoRR  |
2017 |
DBLP BibTeX RDF |
|
22 | Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
Verified Correctness and Security of mbedTLS HMAC-DRBG.  |
CCS  |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
A robust scan-based side-channel attack method against HMAC-SHA-256 circuits.  |
ICCE-Berlin  |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jia-Wei Ma, Xuguang Guan, Tong Zhou, Tao Sun |
A new countermeasure against side channel attack for HMAC-SM3 hardware.  |
ASICON  |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Junhui Li, Liji Wu, Xiangmin Zhang |
An efficient HMAC processor based on the SHA-3 HASH function.  |
ASICON  |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Shunrong Jiang, Xiaoyan Zhu 0005, Liangmin Wang 0001 |
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.  |
IEEE Trans. Intell. Transp. Syst.  |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Catherine H. Gebotys, Brian A. White, Edgar Mateos |
Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256.  |
ACM Trans. Embed. Comput. Syst.  |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Sven Zehl, Anatolij Zubow, Adam Wolisz |
hMAC: Enabling Hybrid TDMA/CSMA on IEEE 802.11 Hardware.  |
CoRR  |
2016 |
DBLP BibTeX RDF |
|
22 | Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin |
AES Encryption with HMAC-SHA2 for Kerberos 5.  |
RFC  |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Johannes Merkle, Manfred Lochter |
HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3.  |
RFC  |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yusuke Naito 0001, Lei Wang 0031 |
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC.  |
CT-RSA  |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without Collision Resistance.  |
J. Cryptol.  |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 201 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|