نتایج جستجو برای: hmac
تعداد نتایج: 237 فیلتر نتایج به سال:
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA256 correctly implements its FIPS functional specification and that its functional specification guarantees the expected cryptographic properties. This is the first machine-checked cryptographic proof that combines a source-program implementation proof, a compilercorrectness proof, and a cryptogra...
Of the $150 million USD pledged for the Strategic Highway Research Program (SHRP), approximately one-third ($50 million USD) is designated for Asphalt Binder Research. The SHRP program is a fiveyear, highly focused, product-oriented research effort. The goal of the asphalt portion of the program is to issue a new binder and mixture specification that will help federal, state and local regulator...
Symmetric cryptography offers high computational efficiency, since it does not rely on expensive operations such as modular exponentiation or cryptographic pairing. Moreover, it offers compact authentication tags, proportional to the size of underlying primitive, for instance 160-bit with SHA1 based HMAC and 128-bit for AES-based MACs. Finally, key sizes are small and almost optimal, which offe...
The Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services, such as detecting oncoming collisions and providing warning signals to alert the driver. The services provided by VANET are often based on collaboration among vehicles that are equipped with relatively simple motion sensors and GPS units. Awareness of its precise locat...
Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [19], RSA Laboratories described a password based key derivation function called PBKDF2 that has been widel...
H-MAC was proposed to increase efficiency over HMAC by omitting its outer key, and keep the advantage and security of HMAC at the same time. However, as pointed out by the designer, the security of H-MAC also depends on the secrecy of the intermediate value (the equivalent key) of the inner hashing. In this paper, we propose an efficient method to break H-MAC, by using a generalized birthday at...
Nowadays the internet is Janus-faced with several challenges. Verifying data integrity and authentication are essential security services in order to secure data transmission process. Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of security threats without compromising the efficiency of the network can be challengin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید