نتایج جستجو برای: hmac

تعداد نتایج: 237  

Journal: :RFC 2011
Donald E. Eastlake Tony Hansen

The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), namely SHA-224, SHA-256, SHA-384, and SHA-512. This document makes open source code performing these SHA hash functions conveniently available to the Internet community. The sample code supports input strings of arbitrary bi...

2011
L. Chen

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

2013
Jayanthi K

A wireless sensor network (WSN) is composed of numerous small sensing devices with limited communication range. The sensors collect data from the environment and report them to the sinks. With the promising sensing and wireless technologies, sensor networks are expected to be widely deployed in a broad spectrum of civil and military applications. Location information of the sinks, the sensors, ...

2008
Hugo Krawczyk

This paper describes and provides detailed rationale for a simple (and fully specified) HMACbased key derivation function (KDF) that can serve multiple applications under a wide variety of requirements and assumptions, and whose design is backed by careful cryptographic analysis. The proposed scheme follows the extract-then-expand paradigm for KDF design (which we present and discuss in great d...

2004
Yevgeniy Dodis Rosario Gennaro Johan Håstad Hugo Krawczyk Tal Rabin

We study the suitability of common pseudorandomness modes associated with cryptographic hash functions and block ciphers (CBCMAC, Cascade and HMAC) for the task of “randomness extraction”, namely, the derivation of keying material from semi-secret and/or semirandom sources. Important applications for such extractors include the derivation of strong cryptographic keys from non-uniform sources of...

LPWANs are a class of technologies that have very low power consumption and high range of communication. Along with its various advantages, these technologies also have many limitations, such as low bandwidth, connectionless transmission and low processing power, which has challenged encryption methods in this technologies. One of the most important of these challenges is encryption. The very s...

2014
Tamanna Saini Anu Garg

Earlier static ID and Password are used which is vulnerable against eavesdropping and replay attack. To overcome this problem One Time Password technique is used which give different password each time. Earlier OTP is HOTP which is based on one way hash function SHA-1 and Ping Pong-128 stream cipher. In this paper we propose a method of generating OTP by using Genetic Algorithm with Elliptic Cu...

2014
Twinkle Patel

As the usage of credit card has increased the credit card fraud has also increased dramatically. Existing fraud detection techniques are not capable to detect fraud at the time when transaction is in progress. Improvement in existing fraud detection is necessary. In this paper Hidden Markov model is used to detect the fraud when transaction is in progress. Here is shown that hidden markov model...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید