Hashing and Message Authentication Code Implementation. An Embedded Approach.

M Rogobete, O Tarabuta - Scientific Bulletin'Mircea cel …, 2019 - search.ebscohost.com
There are different methods by which a message hashing could be embedded in a
communications network, therefore different approaches are described in this research to …

The keyed-hash message authentication code (hmac)

QH Dang - 2008 - nist.gov
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism
for message authentication using cryptographic hash functions. HMAC can be used with any …

Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing

M Kim, Y Kim, J Ryou, S Jun - … Conference, ATC 2007, Hong Kong, China …, 2007 - Springer
Abstract The Mobile Trusted Platform (MTP) is developed and promoted by the Trusted
Computing Group (TCG), which is an industry standard body to enhance the security of the …

VLSI implementation of the keyed-hash message authentication code for the wireless application protocol

G Selimis, N Sklavos… - 10th IEEE International …, 2003 - ieeexplore.ieee.org
Security has become a highly critical issue in the provision of mobile services. The Wireless
Application Protocol (WAP) has specified a powerful security layer, the WTLS. The Keyed …

[PDF][PDF] The keyed-hash message authentication code (hmac)

JM Turner - Federal Information Processing Standards Publication, 2008 - csrc.nist.gov
FIPS 198-1, The Keyed-Hash Message Authentication Code (HMAC) Page 1 FIPS PUB 198-1
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash …

A system-level architecture for hash message authentication code

H Khali, R Mehdi, A Araar - 2005 12th IEEE International …, 2005 - ieeexplore.ieee.org
Modern network-based applications continuously raise the demand for secure data
communications. This demand has motivated the development of new cryptographic …

Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function

HE Michail, AP Kakarountas… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In this paper, an efficient implementation, in terms of performance, of the keyed-hash
message authentication code (HMAC) using the SHA-1 hash function is presented. This …

Keyed hash functions

S Bakhtiari, R Safavi-Naini, J Pieprzyk - International Conference on …, 1995 - Springer
We give a new definition of keyed hash functions and show its relation with strongly
universal hash functions and Cartesian authentication codes. We propose an algorithm for a …

[PDF][PDF] Short− output universal hash functions and their use in fast and secure message authentication

L Nguyen, A Roscoe - FSE 2012, 2012 - ora.ox.ac.uk
Message authentication codes usually require the underlining universal hash functions to
have a long output so that the probability of successfully forging messages is low enough for …

[PDF][PDF] High-speed and low-power implementation of hash message authentication code through partially unrolled techniques

HE Michail, AP Kakarountas, E Fotopoulou… - Proceedings of the 5th …, 2005 - Citeseer
In this paper an efficient implementation, in terms of performance, of the keyed-hash
message authentication code (HMAC) using the SHA-256 hash function is presented. This …