Found 482 results for 'hmac'.
1) encryption - Securing an end-to-end encrypted cloud based address book
2) rsa - Private RSA key for HMAC key
3) hmac - Where should MAC keys come from in a one time pad situation?
4) keys - How to key an HMAC with keys from separate mutually untrusted parties?
5) hmac - Using HMAC-SHA256 with short passwords and sliced outputs for short-lived secure hashing
6) aes - Create a TOTP for machines using HMAC or AES
7) hmac - How does the HOTP dynamic truncation function generalize to longer hashes?
8) authentication - Is this REST service authentication system secure?
9) hash - Hashing - Digital Signing and Trivial Stretching
10) encryption - Vulnerabilities of using HMAC of random ID as shared secret?
11) encryption - Why can't I use the same key for encryption and MAC?
12) hmac - MAC Timing Attack Xbox 360
13) encryption - Timing attack against HMAC in authenticated encryption?
14) hash - Prove that you have the data when hash is public
15) authentication - Authentication scheme using HMAC
16) public-key - Compromise between HMAC and Digital Signature, by encrypting and sending secret key?
17) keys - How long should a HMAC cryptographic key be?
18) algorithm-design - HMAC vs ECDSA for JWT
19) hash - Is it acceptable to use a HMAC-SHA256 hash as a secp256k1 private key?
20) hmac - HKDF entropy extraction
21) hash - Can someone clarify two things about the HKDF by Krawczyk?
22) protocol-design - HMAC key storage for a web app?
23) protocol-design - Is this session start protocol secure?
24) protocol-design - What is a simple information authentication protocol for constrained devices?
25) keys - What is the best way to share a shared secret key over HTTPS to be used for HMAC authentication?
26) encryption - How to design a secure challange-response authentication protocol?
27) aes - Deriving AES key and HMAC key from shorter master key
28) hmac - Using HMAC as a nonce with AES-CTR encrypt-and-MAC
29) hash - PHP AES-256 CBC faster than AES-128 CBC?
30) signature - Signing dynamic data on an embedded system
31) hmac - How secure would HMAC-SHA3 be?
32) hash - Using one-way hash functions as the encryption method
33) hmac - Is my HMAC secure if I have a complete series of HMAC'd prefix strings
34) hmac - HMAC SHA256 for deriving session keys using random nonce
35) symmetric - Is this symmetric key MAC-then-encrypt auth token methodology secure?
36) encryption - Is it safe to use a MAC as iv for CTR encoding?
37) hash - How is HMAC(message,key) more secure than Hash(key1+message+key2)
38) hmac - Security of this deterministic encryption scheme
39) hash - Is HMAC needed for a SHA-3 based MAC?
40) hmac - Length extension attacks, Merkle–Damgård constructions, and HMACs
41) hash - Establishing encryption key using shared secret
42) aes - Is it secure to derive an AES key from a MAC?
43) aes - Side channel security of HMAC in software
44) signature - What are the different uses of MAC and Digital Signature?
45) hash - Is an HMAC based on a second-preimage resistant hash function always unforgeable?
46) stream-cipher - Recommended authenticated stream cipher for minimum overhead?
47) hmac - Using HMAC to secure a "widget"
48) hmac - Is HMAC-MD5 still secure for commitment or other common uses?
49) brute-force-attack - SHA256 HMAC brute force with chosen plaintext attacks
50) authentication - Is it considered insecure in an HOTP implementation to publicly provide the next counter?