-
1
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
96, pp
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '96), pp. 1-15, 1996.
-
(1996)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0013091373
-
The Keyed-Hash Message Authentication Code (HMAC)
-
National Institute of Standards and Technology, Information Technology Laboratory
-
National Institute of Standards and Technology, "The Keyed-Hash Message Authentication Code (HMAC)," FIPS PUB 198, Information Technology Laboratory, 2002.
-
(2002)
FIPS PUB
, vol.198
-
-
-
5
-
-
33750029023
-
On the Security of HMAC and NMAC Based on HAVALl, MD4, MD5, SHA-0 and SHA-1
-
J. Kim, A. Biryukov, B. Preneel, and S. Hong, "On the Security of HMAC and NMAC Based on HAVALl, MD4, MD5, SHA-0 and SHA-1," Proc. Conf. Security and Cryptography for Networks (SCN '06), pp. 242-256, 2006.
-
(2006)
Proc. Conf. Security and Cryptography for Networks (SCN '06)
, pp. 242-256
-
-
Kim, J.1
Biryukov, A.2
Preneel, B.3
Hong, S.4
-
6
-
-
0003629991
-
Secure Hash Standard
-
National Institute of Standards and Technology, Information Technology Laboratory
-
National Institute of Standards and Technology, "Secure Hash Standard," FIPS PUB 180-1, Information Technology Laboratory, 1995.
-
(1995)
FIPS PUB
, pp. 180-181
-
-
-
11
-
-
67349177669
-
E-Passports Can be Cloned in Minutes, Claims Researcher
-
Aug
-
PCWorld, "E-Passports Can be Cloned in Minutes, Claims Researcher,"pcworld.about.com/od/dataprotection/E-Passports-Can-Be-Cloned- in-M.htm, Aug. 2008.
-
(2008)
-
-
PCWorld1
-
15
-
-
35248872610
-
RFID Systems and Security and Privacy Implications. Cryptographic Hardware and Embedded Systems
-
S. Sarma, S. Weis, and D. Engels, "RFID Systems and Security and Privacy Implications. Cryptographic Hardware and Embedded Systems," Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES '02), vol. 2523, pp. 454-469, 2002.
-
(2002)
Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES '02)
, vol.2523
, pp. 454-469
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
19
-
-
24644501824
-
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
-
Apr
-
K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment," Proc. Int'l Conf. Security in Pervasive Computing (SPC '05), Apr. 2005.
-
(2005)
Proc. Int'l Conf. Security in Pervasive Computing (SPC '05)
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
20
-
-
34548830043
-
RFID Security Workshop (RFIDSec '06)
-
printed handout, July
-
M. Feldhofer and C. Rechberge, "A Case against Currently Used Hash Functions in RFID Protocols," RFID Security Workshop (RFIDSec '06), printed handout, July 2006.
-
(2006)
-
-
Feldhofer, M.1
Rechberge, C.2
-
21
-
-
78049327766
-
Hash Functions and RFID Tags: Mind the Gap
-
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. Robshaw, and Y. Seurin, "Hash Functions and RFID Tags: Mind the Gap," Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES '08), 2008.
-
(2008)
Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES '08)
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.5
Seurin, Y.6
-
22
-
-
84877887414
-
Security Analysis of a Cryptographically Enabled RFID Device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, "Security Analysis of a Cryptographically Enabled RFID Device," Proc. USENIX Security Symp., pp. 1-16, 2005.
-
(2005)
Proc. USENIX Security Symp
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
23
-
-
67349279728
-
-
ECRYPT, The Estream Project, The eSTREAM Portfolio, revision 1, Sept. 2008.
-
ECRYPT, "The Estream Project," The eSTREAM Portfolio, revision 1, Sept. 2008.
-
-
-
-
25
-
-
67349277593
-
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
-
Cryptology ePrint Archive, Report
-
B. Zoltak, "VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme," Cryptology ePrint Archive, Report 2004/ 301, 2004.
-
(2004)
, vol.2004
, pp. 301
-
-
Zoltak, B.1
-
26
-
-
33746331948
-
Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive,
-
Ecrypt Stream Cipher Project, Report 2005/020
-
D. Whiting, B. Schneier, S. Lucks, and F. Muller, "Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive," Ecrypt Stream Cipher Project, Report 2005/020, 2005.
-
(2005)
-
-
Whiting, D.1
Schneier, B.2
Lucks, S.3
Muller, F.4
-
27
-
-
67349200155
-
ASC a Stream Cipher with Built in MAC Functionality
-
K. Wirt, "ASC a Stream Cipher with Built in MAC Functionality," Int'l J. Computer Science, vol. 2, pp. 131-136, 2007.
-
(2007)
Int'l J. Computer Science
, vol.2
, pp. 131-136
-
-
Wirt, K.1
-
28
-
-
48249092807
-
The Mundja Streaming MAC
-
Cryptology ePrint Archive, Report 2004/271
-
P. Hawkes, M. Paddon, and G.G. Rose, "The Mundja Streaming MAC," Cryptology ePrint Archive, Report 2004/271, 2004.
-
(2004)
-
-
Hawkes, P.1
Paddon, M.2
Rose, G.G.3
-
29
-
-
30344451674
-
Energy Scalable Universal Hashing
-
J. Kaps, K. Yuksel, and B. Sunar, "Energy Scalable Universal Hashing," IEEE Trans. Computers, vol. 54, pp. 1484-1495, 2005.
-
(2005)
IEEE Trans. Computers
, vol.54
, pp. 1484-1495
-
-
Kaps, J.1
Yuksel, K.2
Sunar, B.3
-
30
-
-
84957068240
-
UMAC: Fast and Secure Message Authentication
-
99, pp
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, "UMAC: Fast and Secure Message Authentication," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '99), pp. 216-233, 1999.
-
(1999)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
31
-
-
67349269402
-
-
B. Schneier, 'Schneier on Security' - SHA-1 Has Been Broken, http://www.schneier.com/blog/archives/2005/02/, 2009.
-
B. Schneier, "'Schneier on Security' - SHA-1 Has Been Broken," http://www.schneier.com/blog/archives/2005/02/, 2009.
-
-
-
-
32
-
-
84949223752
-
Weaknesses in the Key Scheduling Algorithm of RC4
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '01), pp. 1-24, 2001.
-
(2001)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO '01)
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
34
-
-
33749544409
-
New Proofs for NMAC and HMAC: Security without Collision-Resistance
-
M. Bellare, "New Proofs for NMAC and HMAC: Security without Collision-Resistance," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '06), pp. 602-619, 2006.
-
(2006)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO '06)
, pp. 602-619
-
-
Bellare, M.1
-
35
-
-
67349087857
-
-
C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier,T.Pornin,H.Sibert, andC.Berbain, EcryptPhase3DECIM 2 2007, http://www.ecrypt.eu.org/ stream/decimp3.html, 2009.
-
C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier,T.Pornin,H.Sibert, andC.Berbain, "EcryptPhase3DECIM 2 2007," http://www.ecrypt.eu.org/ stream/decimp3.html, 2009.
-
-
-
|