Skip to search formSkip to main contentSkip to account menu

Hash-based message authentication code

Known as: HMAC SHA256, NMAC, Hmac MD5 
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human… 
2018
2018
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these… 
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2011
2011
  • 2011
  • Corpus ID: 33880911
2011
2011
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to… 
2010
2010
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message… 
2009
2009
RFID and wireless sensor networks exemplify computationally constrained environments, where the compact nature of the components… 
2003
2003
Security has become a highly critical issue in the provision of mobile services. The Wireless Application Protocol (WAP) has… 
2002
2002
In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new… 
Highly Cited
2001
Highly Cited
2001
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic…