Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Yu Sasaki, Gaoli Wang, Lei Wang 0031 |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1), pp. 26-38, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Johannes Merkle, Manfred Lochter |
HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7630, pp. 1-14, October 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu |
Cryptanalysis of HMAC/NMAC-Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 149, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen |
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 75, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Mihir Bellare, Anna Lysyanskaya |
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1198, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro |
Generic Security of NMAC and HMAC with Input Whitening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 881, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel |
Verified Correctness and Security of OpenSSL HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015., pp. 207-221, 2015, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma |
New HMAC Message Patches: Secret Patch and CrOw Patch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 285-302, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Saiful Adli Ismail, Md. Asri Ngadi, Johan Mohamad Sharif, Nazri Kama, Othman Mohd Yusop |
HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoMeT ![In: Intelligent Software Methodologies, Tools and Techniques - 14th International Conference, SoMeT 2015, Naples, Italy, September 15-17, 2015. Proceedings, pp. 442-452, 2015, Springer, 978-3-319-22688-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro |
Generic Security of NMAC and HMAC with Input Whitening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![In: Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, pp. 85-109, 2015, Springer, 978-3-662-48799-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Limin Guo, Lihui Wang, Dan Liu, Weijun Shan, Zhimin Zhang, Qing Li 0064, Jun Yu |
A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 350-353, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Denis Ovsienko |
Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7298, pp. 1-55, July 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Peter Gazi, Krzysztof Pietrzak, Michal Rybár |
The Exact PRF-Security of NMAC and HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 578, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
22 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen |
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, pp. 571-590, 2014, Springer, 978-3-662-46705-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Peter Gazi, Krzysztof Pietrzak, Michal Rybár |
The Exact PRF-Security of NMAC and HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pp. 113-130, 2014, Springer, 978-3-662-44370-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Jian Guo 0001, Thomas Peyrin, Yu Sasaki, Lei Wang 0031 |
Updates on Generic Attacks against HMAC and NMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pp. 131-148, 2014, Springer, 978-3-662-44370-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Selman Yakut, Ahmet Bedri Özer |
HMAC based one tıme password generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 2014 22nd Signal Processing and Communications Applications Conference (SIU), Trabzon, Turkey, April 23-25, 2014, pp. 1563-1566, 2014, IEEE, 978-1-4799-4874-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Marcio Juliato, Catherine H. Gebotys |
A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Aerosp. Electron. Syst. ![In: IEEE Trans. Aerosp. Electron. Syst. 49(3), pp. 1536-1554, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong |
Security Analysis of HMAC/NMAC by Using Fault Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Appl. Math. ![In: J. Appl. Math. 2013, pp. 101907:1-101907:6, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Krzysztof Pietrzak |
A Closer Look at HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 212, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
22 | Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro |
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 382, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
22 | Neal Koblitz, Alfred Menezes |
Another look at HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 7(3), pp. 225-251, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Yu Sasaki, Lei Wang 0031 |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers, pp. 493-512, 2013, Springer, 978-3-662-43413-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013, pp. 230-241, 2013, SciTePress, 978-989-8565-73-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
22 | Susana Eiroa, Iluminada Baturone |
FPGA implementation and DPA resistance analysis of a lightweight HMAC construction based on photon hash family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 23rd International Conference on Field programmable Logic and Applications, FPL 2013, Porto, Portugal, September 2-4, 2013, pp. 1-4, 2013, IEEE, 978-1-4799-0004-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu |
Cryptanalysis of HMAC/NMAC-Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![In: Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II, pp. 21-40, 2013, Springer, 978-3-642-42044-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Yusuke Naito 0001, Yu Sasaki, Lei Wang 0031, Kan Yasuda |
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings, pp. 83-98, 2013, Springer, 978-3-642-41382-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Seung Wook Jung, Souhwan Jung |
HRP: A HMAC-based RFID mutual authentication protocol using PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: The International Conference on Information Networking 2013, ICOIN 2013, Bangkok, Thailand, January 28-30, 2013, pp. 578-582, 2013, IEEE Computer Society, 978-1-4673-5740-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Harris E. Michail, George Athanasiou, Vasilios I. Kelefouras, George Theodoridis, Costas E. Goutis |
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Reconfigurable Technol. Syst. ![In: ACM Trans. Reconfigurable Technol. Syst. 5(1), pp. 2:1-2:28, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Changhui Hu, Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li |
Efficient HMAC-based secure communication for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 56(9), pp. 2292-2303, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Love Hörnquist-Åstrand, Tom Yu |
Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6649, pp. 1-7, July 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Thomas Peyrin, Yu Sasaki, Lei Wang 0031 |
Generic Related-key Attacks for HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 684, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
22 | Neal Koblitz, Alfred Menezes |
Another look at HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 74, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
22 | Thomas Peyrin, Yu Sasaki, Lei Wang 0031 |
Generic Related-Key Attacks for HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings, pp. 580-597, 2012, Springer, 978-3-642-34960-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Alireza Beikverdi, Ian K. T. Tan |
Improved look-ahead re-synchronization window for HMAC-based one-time password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWCA ![In: IET International Conference on Wireless Communications and Applications, ICWCA 2012, Kuala Lumpur, Malaysia, October 8-10, 2012, pp. 1-5, 2012, IEEE. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro |
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, pp. 348-366, 2012, Springer, 978-3-642-32008-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Bart Preneel |
HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 559-560, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Sean Turner, Lily Chen |
Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6151, pp. 1-7, March 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Donald E. Eastlake III, Tony Hansen |
US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6234, pp. 1-127, May 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Fan Zhang 0010, Zhijie Jerry Shi |
Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011, pp. 359-365, 2011, IEEE Computer Society, 978-0-7695-4367-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Fu-Tung Wang, Tzong-Dar Wu, Yu-Chung Lu |
Applying HMAC to Enhance Information Security for Mobile Reader RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE (1) ![In: Advances in Computer Science, Environment, Ecoinformatics, and Education - International Conference, CSEE 2011, Wuhan, China, August 21-22, 2011. Proceedings, Part I, pp. 568-573, 2011, Springer, 978-3-642-23320-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Hugo Krawczyk, Pasi Eronen |
HMAC-based Extract-and-Expand Key Derivation Function (HKDF). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5869, pp. 1-14, May 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Zheng Yuan, Jintao Liu, Xiaoqiu Ren |
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 216, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
22 | Sawinee Sangsuriyun, Sanparith Marukatat, Kitsana Waiyamai |
Hierarchical Multi-label Associative Classification (HMAC) using negative rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the 9th IEEE International Conference on Cognitive Informatics, ICCI 2010, July 7-9, 2010, Beijing, China, pp. 919-924, 2010, IEEE Computer Society, 978-1-4244-8041-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Bradley Baker, C. Edward Chow |
HTEE: An HMAC based Tamper Evident Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 196-205, 2010, SciTePress, 978-989-8425-18-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
22 | Manav Bhatia, Vishwas Manral, Matthew J. Fanto, Russ White, Michael Barnes, Tony Li, Randall J. Atkinson |
OSPFv2 HMAC-SHA Cryptographic Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5709, pp. 1-14, October 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yu Sasaki |
A Full Key Recovery Attack on HMAC-AURORA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 125, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
22 | Hongbo Yu, Xiaoyun Wang 0001 |
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 285-297, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai |
An Update on the Analysis and Design of NMAC and HMAC Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 7(1), pp. 49-60, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
22 | Christian Rechberger, Vincent Rijmen |
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 14(3), pp. 347-376, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
Design Space Exploration of a Reconfigurable HMAC-Hash Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Res. Pract. Inf. Technol. ![In: J. Res. Pract. Inf. Technol. 40(2), pp. 109-128, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
22 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
Corrections to "Design and Performance Analysis of a Unified, Reconfigurable HMAC-Hash Unit" [Dec 07 2683-2695]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 55-I(2), pp. 708, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
Design and Performance Analysis of a Unified, Reconfigurable HMAC-Hash Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(12), pp. 2683-2695, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Donald E. Eastlake III |
HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4635, pp. 1-8, August 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Karthik Jaganathan, Larry Zhu, John Brezak |
The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4757, pp. 1-18, December 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Martin Euchner |
HMAC-Authenticated Diffie-Hellman for Multimedia Internet KEYing (MIKEY). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4650, pp. 1-27, September 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Donald E. Eastlake III, Tony Hansen |
US Secure Hash Algorithms (SHA and HMAC-SHA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4634, pp. 1-108, July 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Vlastimil Klíma |
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 376, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
22 | Donghoon Chang, Mridul Nandi |
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 441, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
22 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 187, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
22 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security Without Collision-Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 43, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
22 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 319, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
22 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-Random Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 290, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
22 | Bart Preneel |
HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | David M'Raïhi, Mihir Bellare, Frank Hoornaert, David Naccache, Ohad Ranen |
HOTP: An HMAC-Based One-Time Password Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4226, pp. 1-37, December 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis |
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECS ![In: Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004, Tel Aviv, Israel, December 13-15, 2004, pp. 567-570, 2004, IEEE, 0-7803-8715-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Jim Schaad, Russell Housley |
Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3537, pp. 1-9, May 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Angelos D. Keromytis, Niels Provos |
The Use of HMAC-RIPEMD-160-96 within ESP and AH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2857, pp. 1-7, June 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Cheryl Madson, Rob Glenn |
The Use of HMAC-SHA-1-96 within ESP and AH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2404, pp. 1-7, November 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Cheryl Madson, Rob Glenn |
The Use of HMAC-MD5-96 within ESP and AH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2403, pp. 1-7, November 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Michael J. Oehler, Robert Glenn |
HMAC-MD5 IP Authentication with Replay Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2085, pp. 1-6, February 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
22 | Hugo Krawczyk, Mihir Bellare, Ran Canetti |
HMAC: Keyed-Hashing for Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2104, pp. 1-11, February 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
15 | Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
Accelerating SSL with GPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 437-438, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GPU, CUDA, SSL |
15 | Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 |
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 159-160, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Shweta Agrawal, Dan Boneh |
Homomorphic MACs: MAC-Based Integrity for Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 292-305, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Tong Liu, Jiya Jiang, Ying Li |
Research on File Content Tamper-proofing System for Distribution Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 765-768, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues |
HOTP-Based User Authentication Scheme in Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 672-681, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hongbo Yu, Xiaoyun Wang 0001 |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 185-201, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MAC, distinguishing attack, SHA-256 |
15 | Zheng Gong, Xuejia Lai, Kefei Chen |
A synthetic indifferentiability analysis of some block-cipher-based hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 48(3), pp. 293-305, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 68W40, 68Q25 |
15 | Hidenori Kuwakado, Shoichi Hirose |
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 174-189, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Sébastien Canard, Amandine Jambert |
Group Key Management: From a Non-hierarchical to a Hierarchical Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 213-225, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access Control, Key Management, Hierarchy |
15 | Marc Fischlin |
Security of NMACand HMACBased on Non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 138-154, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Taeshik Shon, Wook Choi |
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 88-97, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Ian M. Molloy, Jiangtao Li 0001, Ninghui Li |
Dynamic Virtual Credit Card Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 208-223, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
credit card theft, e-commerce |
15 | Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abdur Razzaque, Choong Seon Hong |
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, Third International Conference, HPCC 2007, Houston, USA, September 26-28, 2007, Proceedings, pp. 521-532, 2007, Springer, 978-3-540-75443-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Rehan Akbani, Turgay Korkmaz, G. V. S. Raju 0001 |
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (1) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 1, pp. 157-165, 2007, SCS/ACM, 1-56555-312-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
security, MANETs, mobile ad-hoc networks, authentication, HEAP |
15 | Jean-Philippe Aumasson, Willi Meier |
Analysis of Multivariate Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 309-323, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Karl Scheibelhofer |
A Bit-Slice Implementation of the Whirlpool Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 385-401, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yu Liu, Charles G. Boncelet Jr. |
The CRC-NTMAC for Noisy Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(4), pp. 517-523, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
Rescheduling for Optimized SHA-1 Calculation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAMOS ![In: Embedded Computer Systems: Architectures, Modeling, and Simulation, 6th International Workshop, SAMOS 2006, Samos, Greece, July 17-20, 2006, Proceedings, pp. 425-434, 2006, Springer, 3-540-36410-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Ryo Nojima, Kazukuni Kobara, Hideki Imai |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 303-316, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Ilsun You |
Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 336-343, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung |
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 62-71, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Jing Lu, John W. Lockwood |
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Xiangguo Li, Jianhua Yang, Zhaohui Wu 0001 |
An NFSv4-Based Security Scheme for NAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 130-139, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Tadayoshi Kohno |
Attacking and repairing the winZip encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 72-81, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography |
15 | Yihui Luo, Changsheng Xie, Chengfeng Zhang |
A Security Scheme for United Storage Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 238-245, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Bert den Boer, Bart Van Rompay, Bart Preneel, Joos Vandewalle |
New (Two-Track-)MAC Based on the Two Trails of RIPEMD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 314-324, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway |
UMAC: Fast and Secure Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 216-233, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Jee Hea An, Mihir Bellare |
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 252-269, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|