Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 235,090,095 papers from all fields of science
Search
Sign In
Create Free Account
Hash-based message authentication code
Known as:
HMAC SHA256
, NMAC
, Hmac MD5
Expand
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CRYPTREC
Concatenation
Cryptographic hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Increasing Cryptography Security using Hash-based Message Authentication Code
Seyyed Mehdi Mousavi
,
Dr.Mohammad Hossein Shakour
International journal of engineering and…
2019
Corpus ID: 202764063
Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human…
Expand
2018
2018
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
2018
Corpus ID: 64572260
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these…
Expand
2013
2013
Secured Hash2 based Message Authentication Code using GUI Controls
V. Kulkarni
,
S. Kalmani
,
S. Vernekar
2013
Corpus ID: 82983
message that originated from an authorized user is defined as User Authentication and is provided by Message Authentication codes…
Expand
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
2011
2011
Hash-Based Message Authentication Code
Encyclopedia of Cryptography and Security
2011
Corpus ID: 33880911
2010
2010
Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls
B. Sridevi
,
Dr.S. Rajaram
2010
Corpus ID: 54958213
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message…
Expand
2006
2006
Maximizing the hash function of authentication codes
Ioannis Yiakoumis
,
Markos E. Papadonikolakis
,
H. Michail
,
A. Kakarountas
,
C. Goutis
IEEE potentials
2006
Corpus ID: 32711516
A design approach to create small-sized, high-speed implementations of the keyed-hash message authentication code (HMAC) is the…
Expand
Highly Cited
2006
Highly Cited
2006
Comparison of fatigue analysis approaches for predicting fatigue lives of hot-mix asphalt concrete (HMAC) mixtures
L. Walubita
2006
Corpus ID: 138802952
Comparison of Fatigue Analysis Approaches for Predicting Fatigue Lives of Hot-Mix Asphalt Concrete (HMAC) Mixtures. (May 2006…
Expand
Highly Cited
2004
Highly Cited
2004
An HMAC processor with integrated SHA-1 and MD5 algorithms
Mao-Yin Wang
,
Chih-Pin Su
,
Chih-Tsun Huang
,
Cheng-Wen Wu
Asia and South Pacific Design Automation…
2004
Corpus ID: 6577464
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms…
Expand
2003
2003
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol
G. Selimis
,
N. Sklavos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 21445140
Security has become a highly critical issue in the provision of mobile services. The Wireless Application Protocol (WAP) has…
Expand