نتایج جستجو برای: hmac

تعداد نتایج: 237  

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

2015
Lennart Beringer Adam Petcher Katherine Q. Ye Andrew W. Appel

We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA256 correctly implements its FIPS functional specification and that its functional specification guarantees the expected cryptographic properties. This is the first machine-checked cryptographic proof that combines a source-program implementation proof, a compilercorrectness proof, and a cryptogra...

Journal: :ACM Transactions on Reconfigurable Technology and Systems 2012

Journal: :Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 2018

1999
Thomas W. Kennedy

Of the $150 million USD pledged for the Strategic Highway Research Program (SHRP), approximately one-third ($50 million USD) is designated for Asphalt Binder Research. The SHRP program is a fiveyear, highly focused, product-oriented research effort. The goal of the asphalt portion of the program is to issue a new binder and mixture specification that will help federal, state and local regulator...

2017
Attila A Yavuz

Symmetric cryptography offers high computational efficiency, since it does not rely on expensive operations such as modular exponentiation or cryptographic pairing. Moreover, it offers compact authentication tags, proportional to the size of underlying primitive, for instance 160-bit with SHA1 based HMAC and 128-bit for AES-based MACs. Finally, key sizes are small and almost optimal, which offe...

2014
Veena Desai

The Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services, such as detecting oncoming collisions and providing warning signals to alert the driver. The services provided by VANET are often based on collaboration among vehicles that are equipped with relatively simple motion sensors and GPS units. Awareness of its precise locat...

2015
Andrea Visconti Simone Bossi Hany Ragab Alexandro Calò

Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [19], RSA Laboratories described a password based key derivation function called PBKDF2 that has been widel...

2011
Fanbao Liu Tao Xie Changxiang Shen

H-MAC was proposed to increase efficiency over HMAC by omitting its outer key, and keep the advantage and security of HMAC at the same time. However, as pointed out by the designer, the security of H-MAC also depends on the secrecy of the intermediate value (the equivalent key) of the inner hashing. In this paper, we propose an efficient method to break H-MAC, by using a generalized birthday at...

2017
Gurleen Kaur Gurvinder Kaur

Nowadays the internet is Janus-faced with several challenges. Verifying data integrity and authentication are essential security services in order to secure data transmission process. Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of security threats without compromising the efficiency of the network can be challengin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید