|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 134 occurrences of 78 keywords
|
|
|
Results
Found 201 publication records. Showing 201 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
182 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 18-32, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
130 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 242-256, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
114 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 111-127, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
114 | Kan Yasuda |
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 355-369, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function |
114 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 393-403, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
114 | Kan Yasuda |
HMAC without the "Second" Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 443-458, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix |
105 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 121-133, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
105 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 13-30, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
105 | Kerstin Lemke, Kai Schramm, Christof Paar |
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 205-219, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6 |
105 | Mohannad Najjar, Firas Najjar |
d-HMAC Dynamic HMAC function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland, pp. 119-126, 2006, IEEE Computer Society, 0-7695-2565-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
99 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 602-619, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
99 | Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu |
An HMAC processor with integrated SHA-1 and MD5 algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, Yokohama, Japan, January 27-30, 2004, pp. 456-458, 2004, IEEE Computer Society, 0-7803-8175-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Magnus Nyström |
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4231, pp. 1-9, December 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 36-52, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
83 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 432-443, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
83 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 119-133, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
77 | Sarvar Patel |
An Efficient MAC for Short Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 353-368, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 21-32, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
74 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 237-253, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
74 | Shoichi Hirose |
Security Analysis of DRBG Using HMAC in NIST SP 800-90. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 278-291, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-90, pseudorandom bit generator, HMAC, pseudorandom function |
68 | Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane |
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 317-332, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Scott G. Kelly, Sheila Frankel |
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4868, pp. 1-21, May 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Vivek Jain 0001, Anurag Gupta, Dharma P. Agrawal |
On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(4), pp. 489-502, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Concurrent Packet Receptions, Multiple Beam Smart Antennas, Medium Access Control, Wireless Mesh Networks, Deafness |
62 | Kan Yasuda |
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 268-285, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension |
62 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 410-419, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 490-495, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
59 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 1-13, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
59 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 189-206, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
52 | Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette |
Practical Electromagnetic Template Attack on HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 66-80, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 679-685, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 37-53, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Benjamin Arazi |
Message Authentication in Computationally Constrained Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 8(7), pp. 968-974, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Bum-Gon Choi, Woo Jin Jung, Min Young Chung, Byung Jun Ahn |
Hybrid Medium Access Control Scheme to Enhance the Performance of IEEE 802.11s Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part I, pp. 917-927, 2008, Springer, 978-3-540-69838-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Marcio Juliato, Catherine H. Gebotys |
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings, pp. 195-200, 2009, IEEE Computer Society, 978-0-7695-3917-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction |
43 | Hojin Choi, Seog Chung Seo |
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 40165-40177, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Hojin Choi, Seog Chung Seo |
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers, pp. 321-333, 2020, Springer, 978-3-030-65298-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki, Lei Wang 0031 |
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1), pp. 22-30, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki, Lei Wang 0031 |
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 324-339, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: E-Business and Telecommunications - 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers, pp. 363-379, 2014, Springer, 978-3-319-25914-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Justin S. Kapp |
Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2286, pp. 1-7, February 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
43 | P. Cheng, Robert Glenn |
Test Cases for HMAC-MD5 and HMAC-SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2202, pp. 1-9, September 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
37 | Kan Yasuda |
Boosting Merkle-Damgård Hashing for Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 216-231, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC |
37 | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin |
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 494-510, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood |
Scalable and efficient key management for heterogeneous sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 45(1), pp. 44-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks |
31 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 68-81, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
31 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 173-186, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
31 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
An FPGA Design of a Unified Hash Engine for IPSec Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOC ![In: Proceedings of the 5th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2005), 20-24 July 2004, Banff, Alberta, Canada, pp. 450-453, 2005, IEEE Computer Society, 0-7695-2403-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 192-197, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
22 | Sukriti Bhattacharya, Agostino Cortesi |
A Generic Distortion Free Watermarking Technique for Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 252-264, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Database Watermarking, Abstract Interpretation, Galois Connection, HMAC |
22 | Xiangyang Liu, Hongtao Lu |
Fragile Watermarking Schemes for Tamperproof Web Pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2008, 5th International Symposium on Neural Networks, ISNN 2008, Beijing, China, September 24-28, 2008, Proceedings, Part II, pp. 552-559, 2008, Springer, 978-3-540-87733-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Keyed-Hashing for Message Authentication(HMAC), Non-negative Sparse Coding(NNSC), Hash, Fragile watermark |
22 | Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt |
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 395-397, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DEMEM, DRETA, delayed key disclosure, forwarded message, one-way key chain, previous forwarder, validation message, MANET, AODV, OLSR, HMAC |
22 | Marguerite Fayçal, Ahmed Serhrouchni |
CAP: A Context-Aware Peer-to-Peer System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 950-959, 2007, Springer, 978-3-540-76889-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
HKey, VDHT, P2P, DHT, HMAC |
22 | P. Hari Kumar, G. S. Anandha Mala |
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(3), pp. 3181-3209, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer |
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3), pp. 1-29, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata |
When Messages are Keys: Is HMAC a dual-PRF? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 861, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Lukas Vlasak, Antoine Bouvet, Sylvain Guilley |
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT (1) ![In: Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I, pp. 329-349, 2023, Springer, 978-3-031-56231-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata |
When Messages Are Keys: Is HMAC a Dual-PRF? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III, pp. 661-693, 2023, Springer, 978-3-031-38547-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Shimaa A. Abdel Hakeem, HyungWon Kim 0001 |
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(1), pp. 331, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Haythem Hayouni |
E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Mob. Commun. Appl. ![In: EAI Endorsed Trans. Mob. Commun. Appl. 6(20), pp. e1, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher |
A computationally efficient HMAC-based authentication scheme for network coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 79(1), pp. 47-69, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Frank Schuhmacher |
Canonical DPA Attack on HMAC-SHA1/SHA2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings, pp. 193-211, 2022, Springer, 978-3-030-99765-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Cesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta 0001, Ladislau Bölöni |
Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGSC ![In: 13th IEEE International Green and Sustainable Computing Conference, IGSC 2022, Pittsburgh, PA, USA, October 24-25, 2022, pp. 1-7, 2022, IEEE, 978-1-6654-6550-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham |
High-performance Multi-function HMAC-SHA2 FPGA Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEWCAS ![In: 20th IEEE Interregional NEWCAS Conference, NEWCAS 2022, Quebec City, QC, Canada, June 19-22, 2022, pp. 30-34, 2022, IEEE, 978-1-6654-0105-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Zhengjian Duan |
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ML4CS (1) ![In: Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I, pp. 366-379, 2022, Springer, 978-3-031-20095-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 774, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher |
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 116, pp. 102051, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer |
First Full-Fledged Side Channel Attack on HMAC-SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings, pp. 31-52, 2021, Springer, 978-3-030-89914-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh |
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers, pp. 181-196, 2021, Springer, 978-981-19-0522-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I, pp. 585-615, 2021, Springer, 978-3-030-84241-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li |
A bandwidth efficient HMAC-based authentication scheme for network coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 55, pp. 102658, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Xin Jin, Yong Xiao, Shiqi Li, Suying Wang |
Deep Learning-based Side Channel Attack on HMAC SM3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Interact. Multim. Artif. Intell. ![In: Int. J. Interact. Multim. Artif. Intell. 6(4), pp. 113-120, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Andrea Visconti, Federico Gorla |
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 17(4), pp. 775-781, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Gal Benmocha, Eli Biham, Stav Perle |
Unintended Features of APIs: Cryptanalysis of Incremental HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers, pp. 301-325, 2020, Springer, 978-3-030-81651-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld |
HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings, pp. 107-126, 2020, Springer, 978-3-030-65410-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tao Zhou, Yongxin Zhu 0001, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng |
Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCloud ![In: IEEE International Conference on Smart Cloud, SmartCloud 2020, Washington, DC, USA, November 6-8, 2020, pp. 88-93, 2020, IEEE, 978-1-7281-6547-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Sundar Srinivasan, K. B. ShivaKumar, Mohammad Muazzam |
HMAC-RSA: A security mechanism in cognitive radio for enhancing the security in a radio cognitive system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 36(5), pp. 4449-4459, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Russell Housley |
Algorithm Identifiers for the HMAC-based Extract-and-Expand Key Derivation Function (HKDF). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8619, pp. 1-6, June 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Amine Erroutbi, Adnane El Hanjri, Abderrahim Sekkaki |
Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC2 ![In: 2019 IEEE International Smart Cities Conference, ISC2 2019, Casablanca, Morocco, October 14-17, 2019, pp. 251-257, 2019, IEEE, 978-1-7281-0846-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sebastian Litzinger, Oliver Körber, Jörg Keller 0001 |
Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCS ![In: 17th International Conference on High Performance Computing & Simulation, HPCS 2019, Dublin, Ireland, July 15-19, 2019, pp. 152-158, 2019, IEEE, 978-1-7281-4484-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSJ Trans. Syst. LSI Des. Methodol. ![In: IPSJ Trans. Syst. LSI Des. Methodol. 11, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Formal analysis of HMAC authorisation in the TPM2.0 specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 12(2), pp. 133-140, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yonghui Chen, Cheng Zhang 0007, Wei Li 0092, Tingsong Chen, Mingwu Zhang |
A publicly verifiable network coding scheme with null-space HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Inf. Database Syst. ![In: Int. J. Intell. Inf. Database Syst. 11(2/3), pp. 117-131, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Marc Fischlin, Christian Janson, Sogol Mazaheri |
Backdoored Hash Functions: Immunizing HMAC and HKDF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 362, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Andrea Visconti, Federico Gorla |
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 97, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Marc Fischlin, Christian Janson, Sogol Mazaheri |
Backdoored Hash Functions: Immunizing HMAC and HKDF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018, pp. 105-118, 2018, IEEE Computer Society, 978-1-5386-6680-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao |
HSATA: Improved SATA Protocol with HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: 27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-5156-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Mohannad Najjar |
Using Improved d-HMAC for Password Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Inf. Sci. ![In: Comput. Inf. Sci. 10(3), pp. 1-9, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Lihui Lin, Kaizhi Chen, Shangping Zhong |
Enhancing the Session Security of Zen Cart based on HMAC-SHA256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(1), pp. 466-483, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
Verified Correctness and Security of mbedTLS HMAC-DRBG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1708.08542, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
Verified Correctness and Security of mbedTLS HMAC-DRBG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 2007-2020, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-Berlin ![In: 7th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2017, Berlin, Germany, September 3-6, 2017, pp. 79-84, 2017, IEEE, 978-1-5090-4014-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jia-Wei Ma, Xuguang Guan, Tong Zhou, Tao Sun |
A new countermeasure against side channel attack for HMAC-SM3 hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 12th IEEE International Conference on ASIC, ASICON 2017, Guiyang, China, October 25-28, 2017, pp. 327-330, 2017, IEEE, 978-1-5090-6625-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Junhui Li, Liji Wu, Xiangmin Zhang |
An efficient HMAC processor based on the SHA-3 HASH function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 12th IEEE International Conference on ASIC, ASICON 2017, Guiyang, China, October 25-28, 2017, pp. 252-255, 2017, IEEE, 978-1-5090-6625-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Shunrong Jiang, Xiaoyan Zhu 0005, Liangmin Wang 0001 |
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 17(8), pp. 2193-2204, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Catherine H. Gebotys, Brian A. White, Edgar Mateos |
Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 15(1), pp. 4:1-4:19, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Sven Zehl, Anatolij Zubow, Adam Wolisz |
hMAC: Enabling Hybrid TDMA/CSMA on IEEE 802.11 Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1611.05376, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin |
AES Encryption with HMAC-SHA2 for Kerberos 5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8009, pp. 1-19, October 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Johannes Merkle, Manfred Lochter |
HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7860, pp. 1-14, April 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yusuke Naito 0001, Lei Wang 0031 |
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings, pp. 397-412, 2016, Springer, 978-3-319-29484-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without Collision Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 28(4), pp. 844-878, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 201 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|