CBC-MAC

Results: 64



#Item
11CS255: Cryptography and Computer Security  Winter 2005 Assignment #2 Due: Wednesday, February 16th, 2005.

CS255: Cryptography and Computer Security Winter 2005 Assignment #2 Due: Wednesday, February 16th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-08 17:18:01
12Cryptographic hashing  Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
13J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
14Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
15An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
16Significant Changes In 2013 California Codes For CBC Chapter 11B Accessibility Standards PL ANNING & BUI LDING D EPART M ENT  COUNT Y OF SAN LUI S OB ISPO 976 OSOS STREET  

Significant Changes In 2013 California Codes For CBC Chapter 11B Accessibility Standards PL ANNING & BUI LDING D EPART M ENT  COUNT Y OF SAN LUI S OB ISPO 976 OSOS STREET 

Add to Reading List

Source URL: www.slocounty.ca.gov

Language: English - Date: 2014-03-18 14:23:13
17First Modes of Operation Workshop (October[removed]A Suggestion for Handling Arbitrary-Length Messages with the CBC MAC

First Modes of Operation Workshop (October[removed]A Suggestion for Handling Arbitrary-Length Messages with the CBC MAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:22:17
18Report on the Symmetric Key Block Cipher Modes of Operation Workshop

Report on the Symmetric Key Block Cipher Modes of Operation Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:20:22
19Second Modes of Operation Workshop (August[removed]PMAC: A Parallelizable Message Autentication Code

Second Modes of Operation Workshop (August[removed]PMAC: A Parallelizable Message Autentication Code

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:10:47
20First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: PMAC: A Parallelizable Message Authentication Code

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: PMAC: A Parallelizable Message Authentication Code

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:41:02