The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for HMAC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2004 (19) 2005-2006 (28) 2007 (19) 2008 (19) 2009 (16) 2010-2012 (19) 2013-2014 (19) 2015-2016 (19) 2017-2019 (18) 2020-2022 (20) 2023 (5)
Publication types (Num. hits)
article(85) incollection(2) inproceedings(114)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 134 occurrences of 78 keywords

Results
Found 201 publication records. Showing 201 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
182Kan Yasuda Multilane HMAC - Security beyond the Birthday Limit. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack
130Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
114Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
114Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function
114Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
114Kan Yasuda HMAC without the "Second" Key. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix
105Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC
105Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
105Kerstin Lemke, Kai Schramm, Christof Paar DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6
105Mohannad Najjar, Firas Najjar d-HMAC Dynamic HMAC function. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
99Mihir Bellare New Proofs for NMAC and HMAC: Security without collision-resistance. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
99Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu An HMAC processor with integrated SHA-1 and MD5 algorithms. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
86Magnus Nyström Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
83Yu Sasaki Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DMMD, collision, HMAC, second preimage, AURORA
83Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
83Christian Rechberger, Vincent Rijmen On Authentication with HMAC and Non-random Properties. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
77Sarvar Patel An Efficient MAC for Short Messages. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
74Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer HMAC is a randomness extractor and applications to TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key extraction, TLS, HMAC, randomness extraction
74Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
74Shoichi Hirose Security Analysis of DRBG Using HMAC in NIST SP 800-90. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-90, pseudorandom bit generator, HMAC, pseudorandom function
68Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
65Scott G. Kelly, Sheila Frankel Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Vivek Jain 0001, Anurag Gupta, Dharma P. Agrawal On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Concurrent Packet Receptions, Multiple Beam Smart Antennas, Medium Access Control, Wireless Mesh Networks, Deafness
62Kan Yasuda A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension
62Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang A network security processor design based on an integrated SOC design and test platform. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG
59Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
59Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL
52Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette Practical Electromagnetic Template Attack on HMAC. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera Extracting Kerberos passwords through RC4-HMAC encryption type analysis. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Benjamin Arazi Message Authentication in Computationally Constrained Environments. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Bum-Gon Choi, Woo Jin Jung, Min Young Chung, Byung Jun Ahn Hybrid Medium Access Control Scheme to Enhance the Performance of IEEE 802.11s Wireless Mesh Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Marcio Juliato, Catherine H. Gebotys Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. Search on Bibsonomy ReConFig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction
43Hojin Choi, Seog Chung Seo Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Hojin Choi, Seog Chung Seo Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments. Search on Bibsonomy WISA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
43Yu Sasaki, Lei Wang 0031 Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
43Yu Sasaki, Lei Wang 0031 Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
43Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
43Justin S. Kapp Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128. Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
43P. Cheng, Robert Glenn Test Cases for HMAC-MD5 and HMAC-SHA-1. Search on Bibsonomy RFC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
37Kan Yasuda Boosting Merkle-Damgård Hashing for Message Authentication. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC
37Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood Scalable and efficient key management for heterogeneous sensor networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks
31Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
31Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
31Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr An FPGA Design of a Unified Hash Engine for IPSec Authentication. Search on Bibsonomy IWSOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication
22Sukriti Bhattacharya, Agostino Cortesi A Generic Distortion Free Watermarking Technique for Relational Databases. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database Watermarking, Abstract Interpretation, Galois Connection, HMAC
22Xiangyang Liu, Hongtao Lu Fragile Watermarking Schemes for Tamperproof Web Pages. Search on Bibsonomy ISNN (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Keyed-Hashing for Message Authentication(HMAC), Non-negative Sparse Coding(NNSC), Hash, Fragile watermark
22Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DEMEM, DRETA, delayed key disclosure, forwarded message, one-way key chain, previous forwarder, validation message, MANET, AODV, OLSR, HMAC
22Marguerite Fayçal, Ahmed Serhrouchni CAP: A Context-Aware Peer-to-Peer System. Search on Bibsonomy OTM Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HKey, VDHT, P2P, DHT, HMAC
22P. Hari Kumar, G. S. Anandha Mala HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata When Messages are Keys: Is HMAC a dual-PRF? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Lukas Vlasak, Antoine Bouvet, Sylvain Guilley Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. Search on Bibsonomy INDOCRYPT (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata When Messages Are Keys: Is HMAC a Dual-PRF? Search on Bibsonomy CRYPTO (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Shimaa A. Abdel Hakeem, HyungWon Kim 0001 Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Haythem Hayouni E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs. Search on Bibsonomy EAI Endorsed Trans. Mob. Commun. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher A computationally efficient HMAC-based authentication scheme for network coding. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Frank Schuhmacher Canonical DPA Attack on HMAC-SHA1/SHA2. Search on Bibsonomy COSADE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Cesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta 0001, Ladislau Bölöni Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC). Search on Bibsonomy IGSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham High-performance Multi-function HMAC-SHA2 FPGA Implementation. Search on Bibsonomy NEWCAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Zhengjian Duan High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm. Search on Bibsonomy ML4CS (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Akinori Hosoyamada, Tetsu Iwata On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
22Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer First Full-Fledged Side Channel Attack on HMAC-SHA-2. Search on Bibsonomy COSADE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. Search on Bibsonomy FCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Akinori Hosoyamada, Tetsu Iwata On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. Search on Bibsonomy CRYPTO (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li A bandwidth efficient HMAC-based authentication scheme for network coding. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Xin Jin, Yong Xiao, Shiqi Li, Suying Wang Deep Learning-based Side Channel Attack on HMAC SM3. Search on Bibsonomy Int. J. Interact. Multim. Artif. Intell. The full citation details ... 2020 DBLP  BibTeX  RDF
22Andrea Visconti, Federico Gorla Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Gal Benmocha, Eli Biham, Stav Perle Unintended Features of APIs: Cryptanalysis of Incremental HMAC. Search on Bibsonomy SAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security. Search on Bibsonomy CANS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Tao Zhou, Yongxin Zhu 0001, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection. Search on Bibsonomy SmartCloud The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Sundar Srinivasan, K. B. ShivaKumar, Mohammad Muazzam HMAC-RSA: A security mechanism in cognitive radio for enhancing the security in a radio cognitive system. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Russell Housley Algorithm Identifiers for the HMAC-based Extract-and-Expand Key Derivation Function (HKDF). Search on Bibsonomy RFC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Amine Erroutbi, Adnane El Hanjri, Abderrahim Sekkaki Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes. Search on Bibsonomy ISC2 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Sebastian Litzinger, Oliver Körber, Jörg Keller 0001 Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms. Search on Bibsonomy HPCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Daisuke Oku, Masao Yanagisawa, Nozomu Togawa Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures. Search on Bibsonomy IPSJ Trans. Syst. LSI Des. Methodol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Jianxiong Shao, Yu Qin, Dengguo Feng Formal analysis of HMAC authorisation in the TPM2.0 specification. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Yonghui Chen, Cheng Zhang 0007, Wei Li 0092, Tingsong Chen, Mingwu Zhang A publicly verifiable network coding scheme with null-space HMAC. Search on Bibsonomy Int. J. Intell. Inf. Database Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Marc Fischlin, Christian Janson, Sogol Mazaheri Backdoored Hash Functions: Immunizing HMAC and HKDF. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Andrea Visconti, Federico Gorla Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Marc Fischlin, Christian Janson, Sogol Mazaheri Backdoored Hash Functions: Immunizing HMAC and HKDF. Search on Bibsonomy CSF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Yatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao HSATA: Improved SATA Protocol with HMAC. Search on Bibsonomy ICCCN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Mohannad Najjar Using Improved d-HMAC for Password Storage. Search on Bibsonomy Comput. Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Lihui Lin, Kaizhi Chen, Shangping Zhong Enhancing the Session Security of Zen Cart based on HMAC-SHA256. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel Verified Correctness and Security of mbedTLS HMAC-DRBG. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
22Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel Verified Correctness and Security of mbedTLS HMAC-DRBG. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Daisuke Oku, Masao Yanagisawa, Nozomu Togawa A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. Search on Bibsonomy ICCE-Berlin The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Jia-Wei Ma, Xuguang Guan, Tong Zhou, Tao Sun A new countermeasure against side channel attack for HMAC-SM3 hardware. Search on Bibsonomy ASICON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Junhui Li, Liji Wu, Xiangmin Zhang An efficient HMAC processor based on the SHA-3 HASH function. Search on Bibsonomy ASICON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Shunrong Jiang, Xiaoyan Zhu 0005, Liangmin Wang 0001 An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Catherine H. Gebotys, Brian A. White, Edgar Mateos Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Sven Zehl, Anatolij Zubow, Adam Wolisz hMAC: Enabling Hybrid TDMA/CSMA on IEEE 802.11 Hardware. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
22Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin AES Encryption with HMAC-SHA2 for Kerberos 5. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Johannes Merkle, Manfred Lochter HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Yusuke Naito 0001, Lei Wang 0031 Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Mihir Bellare New Proofs for NMAC and HMAC: Security without Collision Resistance. Search on Bibsonomy J. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 201 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license