Skip to search formSkip to main contentSkip to account menu

Hash-based message authentication code

Known as: HMAC SHA256, NMAC, Hmac MD5 
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human… 
2018
2018
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these… 
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2011
2011
  • 2011
  • Corpus ID: 33880911
2010
2010
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message… 
2010
2010
The growing demand for secure communications has lead to the utilization of cryptographic mechanisms on-board spacecrafts… 
2007
2007
The Mobile Trusted Platform (MTP) is developed and promoted by the Trusted Computing Group (TCG), which is an industry standard… 
2003
2003
Security has become a highly critical issue in the provision of mobile services. The Wireless Application Protocol (WAP) has… 
2002
2002
In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new… 
1998
1998
A 1-year research project was conducted to evaluate the Cape seal process as a pavement rehabilitation technique. During the…