|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 134 occurrences of 78 keywords
|
|
|
Results
Found 201 publication records. Showing 201 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
182 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
130 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
114 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
114 | Kan Yasuda |
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function |
114 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
114 | Kan Yasuda |
HMAC without the "Second" Key. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix |
105 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
105 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
105 | Kerstin Lemke, Kai Schramm, Christof Paar |
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6 |
105 | Mohannad Najjar, Firas Najjar |
d-HMAC Dynamic HMAC function. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
99 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
99 | Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu |
An HMAC processor with integrated SHA-1 and MD5 algorithms. |
ASP-DAC |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Magnus Nyström |
Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512. |
RFC |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
83 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
83 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
77 | Sarvar Patel |
An Efficient MAC for Short Messages. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
74 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
74 | Shoichi Hirose |
Security Analysis of DRBG Using HMAC in NIST SP 800-90. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-90, pseudorandom bit generator, HMAC, pseudorandom function |
68 | Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane |
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Scott G. Kelly, Sheila Frankel |
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. |
RFC |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Vivek Jain 0001, Anurag Gupta, Dharma P. Agrawal |
On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
Concurrent Packet Receptions, Multiple Beam Smart Antennas, Medium Access Control, Wireless Mesh Networks, Deafness |
62 | Kan Yasuda |
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension |
62 | Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
59 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
59 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
52 | Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette |
Practical Electromagnetic Template Attack on HMAC. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Benjamin Arazi |
Message Authentication in Computationally Constrained Environments. |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Bum-Gon Choi, Woo Jin Jung, Min Young Chung, Byung Jun Ahn |
Hybrid Medium Access Control Scheme to Enhance the Performance of IEEE 802.11s Wireless Mesh Networks. |
ICCSA (1) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Marcio Juliato, Catherine H. Gebotys |
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. |
ReConFig |
2009 |
DBLP DOI BibTeX RDF |
Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction |
43 | Hojin Choi, Seog Chung Seo |
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Hojin Choi, Seog Chung Seo |
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments. |
WISA |
2020 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki, Lei Wang 0031 |
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki, Lei Wang 0031 |
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. |
SCN |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. |
ICETE (Selected Papers) |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Justin S. Kapp |
Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128. |
RFC |
1998 |
DBLP DOI BibTeX RDF |
|
43 | P. Cheng, Robert Glenn |
Test Cases for HMAC-MD5 and HMAC-SHA-1. |
RFC |
1997 |
DBLP DOI BibTeX RDF |
|
37 | Kan Yasuda |
Boosting Merkle-Damgård Hashing for Message Authentication. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC |
37 | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin |
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood |
Scalable and efficient key management for heterogeneous sensor networks. |
J. Supercomput. |
2008 |
DBLP DOI BibTeX RDF |
Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks |
31 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
31 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
31 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
An FPGA Design of a Unified Hash Engine for IPSec Authentication. |
IWSOC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
22 | Sukriti Bhattacharya, Agostino Cortesi |
A Generic Distortion Free Watermarking Technique for Relational Databases. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Database Watermarking, Abstract Interpretation, Galois Connection, HMAC |
22 | Xiangyang Liu, Hongtao Lu |
Fragile Watermarking Schemes for Tamperproof Web Pages. |
ISNN (2) |
2008 |
DBLP DOI BibTeX RDF |
Keyed-Hashing for Message Authentication(HMAC), Non-negative Sparse Coding(NNSC), Hash, Fragile watermark |
22 | Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt |
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
DEMEM, DRETA, delayed key disclosure, forwarded message, one-way key chain, previous forwarder, validation message, MANET, AODV, OLSR, HMAC |
22 | Marguerite Fayçal, Ahmed Serhrouchni |
CAP: A Context-Aware Peer-to-Peer System. |
OTM Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
HKey, VDHT, P2P, DHT, HMAC |
22 | P. Hari Kumar, G. S. Anandha Mala |
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer |
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata |
When Messages are Keys: Is HMAC a dual-PRF? |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
22 | Lukas Vlasak, Antoine Bouvet, Sylvain Guilley |
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. |
INDOCRYPT (1) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matilda Backendal, Mihir Bellare, Felix Günther 0001, Matteo Scarlata |
When Messages Are Keys: Is HMAC a Dual-PRF? |
CRYPTO (3) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Shimaa A. Abdel Hakeem, HyungWon Kim 0001 |
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Haythem Hayouni |
E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs. |
EAI Endorsed Trans. Mob. Commun. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher |
A computationally efficient HMAC-based authentication scheme for network coding. |
Telecommun. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Frank Schuhmacher |
Canonical DPA Attack on HMAC-SHA1/SHA2. |
COSADE |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Cesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta 0001, Ladislau Bölöni |
Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC). |
IGSC |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham |
High-performance Multi-function HMAC-SHA2 FPGA Implementation. |
NEWCAS |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Zhengjian Duan |
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm. |
ML4CS (1) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
22 | Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher |
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. |
J. Syst. Archit. |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer |
First Full-Fledged Side Channel Attack on HMAC-SHA-2. |
COSADE |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh |
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. |
FCS |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. |
CRYPTO (1) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li |
A bandwidth efficient HMAC-based authentication scheme for network coding. |
J. Inf. Secur. Appl. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Xin Jin, Yong Xiao, Shiqi Li, Suying Wang |
Deep Learning-based Side Channel Attack on HMAC SM3. |
Int. J. Interact. Multim. Artif. Intell. |
2020 |
DBLP BibTeX RDF |
|
22 | Andrea Visconti, Federico Gorla |
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. |
IEEE Trans. Dependable Secur. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Gal Benmocha, Eli Biham, Stav Perle |
Unintended Features of APIs: Cryptanalysis of Incremental HMAC. |
SAC |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Pablo Picazo-Sanchez, Gerardo Schneider, Andrei Sabelfeld |
HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security. |
CANS |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tao Zhou, Yongxin Zhu 0001, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng |
Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection. |
SmartCloud |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Sundar Srinivasan, K. B. ShivaKumar, Mohammad Muazzam |
HMAC-RSA: A security mechanism in cognitive radio for enhancing the security in a radio cognitive system. |
J. Intell. Fuzzy Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Russell Housley |
Algorithm Identifiers for the HMAC-based Extract-and-Expand Key Derivation Function (HKDF). |
RFC |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Amine Erroutbi, Adnane El Hanjri, Abderrahim Sekkaki |
Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes. |
ISC2 |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sebastian Litzinger, Oliver Körber, Jörg Keller 0001 |
Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms. |
HPCS |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures. |
IPSJ Trans. Syst. LSI Des. Methodol. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Formal analysis of HMAC authorisation in the TPM2.0 specification. |
IET Inf. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yonghui Chen, Cheng Zhang 0007, Wei Li 0092, Tingsong Chen, Mingwu Zhang |
A publicly verifiable network coding scheme with null-space HMAC. |
Int. J. Intell. Inf. Database Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Marc Fischlin, Christian Janson, Sogol Mazaheri |
Backdoored Hash Functions: Immunizing HMAC and HKDF. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
22 | Andrea Visconti, Federico Gorla |
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
22 | Marc Fischlin, Christian Janson, Sogol Mazaheri |
Backdoored Hash Functions: Immunizing HMAC and HKDF. |
CSF |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Yatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao |
HSATA: Improved SATA Protocol with HMAC. |
ICCCN |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Mohannad Najjar |
Using Improved d-HMAC for Password Storage. |
Comput. Inf. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Lihui Lin, Kaizhi Chen, Shangping Zhong |
Enhancing the Session Security of Zen Cart based on HMAC-SHA256. |
KSII Trans. Internet Inf. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
Verified Correctness and Security of mbedTLS HMAC-DRBG. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
22 | Katherine Q. Ye, Matthew Green 0001, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel |
Verified Correctness and Security of mbedTLS HMAC-DRBG. |
CCS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Daisuke Oku, Masao Yanagisawa, Nozomu Togawa |
A robust scan-based side-channel attack method against HMAC-SHA-256 circuits. |
ICCE-Berlin |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jia-Wei Ma, Xuguang Guan, Tong Zhou, Tao Sun |
A new countermeasure against side channel attack for HMAC-SM3 hardware. |
ASICON |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Junhui Li, Liji Wu, Xiangmin Zhang |
An efficient HMAC processor based on the SHA-3 HASH function. |
ASICON |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Shunrong Jiang, Xiaoyan Zhu 0005, Liangmin Wang 0001 |
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs. |
IEEE Trans. Intell. Transp. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Catherine H. Gebotys, Brian A. White, Edgar Mateos |
Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256. |
ACM Trans. Embed. Comput. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Sven Zehl, Anatolij Zubow, Adam Wolisz |
hMAC: Enabling Hybrid TDMA/CSMA on IEEE 802.11 Hardware. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
22 | Michael J. Jenkins, Michael A. Peck, Kelley W. Burgin |
AES Encryption with HMAC-SHA2 for Kerberos 5. |
RFC |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Johannes Merkle, Manfred Lochter |
HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3. |
RFC |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yusuke Naito 0001, Lei Wang 0031 |
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. |
CT-RSA |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without Collision Resistance. |
J. Cryptol. |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 201 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|