Hash-based message authentication code

Known as: HMAC SHA256, NMAC, Hmac MD5 
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1993-2017
0204019932017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
While standard message authentication codes (MACs) guarantee authenticity of messages, they do not, in general, guarantee the… (More)
  • figure 1
Is this relevant?
2013
2013
Traditionally supervisory control and data acquisition (SCADA) networks were physically isolated, providing some inherent level… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2013
2013
  • R. Kogila
  • 2013
In this thesis, present a new secure authentication system is proposed that significantly reduces the possibility of frauds. This… (More)
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their… (More)
  • figure 2
  • figure 3
  • figure 4
  • table I
  • figure 5
Is this relevant?
2011
2011
constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in… (More)
Is this relevant?
2009
2009
We design an efficient mode of operation on block ciphers, SS-NMAC. Our mode has the following properties, when instantiated with… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
Some message authentication codes (MACs) are vulnerable to multiple forgery attacks, in which an attacker can gain information… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Two parties communicating across an insecure channel need a method by which any attempt to modify the information sent by one to… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 4
Is this relevant?