Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,053,714 papers from all fields of science
Search
Sign In
Create Free Account
Hash-based message authentication code
Known as:
HMAC SHA256
, NMAC
, Hmac MD5
Expand
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CRYPTREC
Concatenation
Cryptographic hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Increasing Cryptography Security using Hash-based Message Authentication Code
Seyyed Mehdi Mousavi
,
Dr.Mohammad Hossein Shakour
International journal of engineering and…
2019
Corpus ID: 202764063
Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human…
Expand
2018
2018
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
2018
Corpus ID: 64572260
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these…
Expand
2014
2014
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
S. Masadeh
,
Ahmad Azzazi
,
B. Alqaralleh
,
A. Ali
,
Mousa. Al Sbou
2014
Corpus ID: 61511893
Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of…
Expand
2013
2013
Secured Hash2 based Message Authentication Code using GUI Controls
V. Kulkarni
,
S. Kalmani
,
S. Vernekar
2013
Corpus ID: 82983
message that originated from an authorized user is defined as User Authentication and is provided by Message Authentication codes…
Expand
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
2011
2011
Hash-Based Message Authentication Code
Encyclopedia of Cryptography and Security
2011
Corpus ID: 33880911
2010
2010
Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls
B. Sridevi
,
Dr.S. Rajaram
2010
Corpus ID: 54958213
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message…
Expand
2003
2003
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol
G. Selimis
,
N. Sklavos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 21445140
Security has become a highly critical issue in the provision of mobile services. The Wireless Application Protocol (WAP) has…
Expand
2003
2003
EVALUATION OF NON-NUCLEAR DENSITY GAUGES FOR HMAC: YEAR 1 REPORT
S. Sebesta
,
M. Zeig
,
T. Scullion
2003
Corpus ID: 107627695
This report describes research efforts to determine if commercially available non-nuclear density gauges can be used for the…
Expand
1998
1998
EVALUATION OF THE CAPE SEAL PROCESS AS A PAVEMENT REHABILITATION ALTERNATIVE
M. Solaimanian
,
T. W. Kennedy
1998
Corpus ID: 264204503
A 1-year research project was conducted to evaluate the Cape seal process as a pavement rehabilitation technique. During the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE