Hashing and Message Authentication Code Implementation. An Embedded Approach.
M Rogobete, O Tarabuta - Scientific Bulletin'Mircea cel …, 2019 - search.ebscohost.com
There are different methods by which a message hashing could be embedded in a
communications network, therefore different approaches are described in this research to …
communications network, therefore different approaches are described in this research to …
The keyed-hash message authentication code (hmac)
QH Dang - 2008 - nist.gov
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism
for message authentication using cryptographic hash functions. HMAC can be used with any …
for message authentication using cryptographic hash functions. HMAC can be used with any …
Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing
Abstract The Mobile Trusted Platform (MTP) is developed and promoted by the Trusted
Computing Group (TCG), which is an industry standard body to enhance the security of the …
Computing Group (TCG), which is an industry standard body to enhance the security of the …
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol
Security has become a highly critical issue in the provision of mobile services. The Wireless
Application Protocol (WAP) has specified a powerful security layer, the WTLS. The Keyed …
Application Protocol (WAP) has specified a powerful security layer, the WTLS. The Keyed …
[PDF][PDF] The keyed-hash message authentication code (hmac)
JM Turner - Federal Information Processing Standards Publication, 2008 - csrc.nist.gov
FIPS 198-1, The Keyed-Hash Message Authentication Code (HMAC) Page 1 FIPS PUB 198-1
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash …
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash …
A system-level architecture for hash message authentication code
H Khali, R Mehdi, A Araar - 2005 12th IEEE International …, 2005 - ieeexplore.ieee.org
Modern network-based applications continuously raise the demand for secure data
communications. This demand has motivated the development of new cryptographic …
communications. This demand has motivated the development of new cryptographic …
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
HE Michail, AP Kakarountas… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In this paper, an efficient implementation, in terms of performance, of the keyed-hash
message authentication code (HMAC) using the SHA-1 hash function is presented. This …
message authentication code (HMAC) using the SHA-1 hash function is presented. This …
Keyed hash functions
S Bakhtiari, R Safavi-Naini, J Pieprzyk - International Conference on …, 1995 - Springer
We give a new definition of keyed hash functions and show its relation with strongly
universal hash functions and Cartesian authentication codes. We propose an algorithm for a …
universal hash functions and Cartesian authentication codes. We propose an algorithm for a …
[PDF][PDF] Short− output universal hash functions and their use in fast and secure message authentication
Message authentication codes usually require the underlining universal hash functions to
have a long output so that the probability of successfully forging messages is low enough for …
have a long output so that the probability of successfully forging messages is low enough for …
[PDF][PDF] High-speed and low-power implementation of hash message authentication code through partially unrolled techniques
HE Michail, AP Kakarountas, E Fotopoulou… - Proceedings of the 5th …, 2005 - Citeseer
In this paper an efficient implementation, in terms of performance, of the keyed-hash
message authentication code (HMAC) using the SHA-256 hash function is presented. This …
message authentication code (HMAC) using the SHA-256 hash function is presented. This …