Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,323 papers from all fields of science
Search
Sign In
Create Free Account
Hash-based message authentication code
Known as:
HMAC SHA256
, NMAC
, Hmac MD5
Expand
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Authentication
CRYPTREC
Concatenation
Cryptographic hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Increasing Cryptography Security using Hash-based Message Authentication Code
Seyyed Mehdi Mousavi
,
Dr.Mohammad Hossein Shakour
International journal of engineering and…
2019
Corpus ID: 202764063
Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human…
Expand
2018
2018
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
2018
Corpus ID: 64572260
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these…
Expand
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
2011
2011
Hash-Based Message Authentication Code
Encyclopedia of Cryptography and Security
2011
Corpus ID: 33880911
2011
2011
Advancing the Cryptographic Hash-Based Message Authentication Code
Manish Kumar
,
A. Avasthi
,
G. Gaurav
2011
Corpus ID: 59289356
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to…
Expand
2010
2010
Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls
B. Sridevi
,
Dr.S. Rajaram
2010
Corpus ID: 54958213
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message…
Expand
2009
2009
Message Authentication in Computationally Constrained Environments
B. Arazi
IEEE Transactions on Mobile Computing
2009
Corpus ID: 12203758
RFID and wireless sensor networks exemplify computationally constrained environments, where the compact nature of the components…
Expand
2003
2003
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol
G. Selimis
,
N. Sklavos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 21445140
Security has become a highly critical issue in the provision of mobile services. The Wireless Application Protocol (WAP) has…
Expand
2002
2002
Message Authentication Codes with Error Correcting Capabilities
Charles C. Y. Lam
,
G. Gong
,
S. Vanstone
International Conference on Information…
2002
Corpus ID: 31142162
In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new…
Expand
Highly Cited
2001
Highly Cited
2001
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board
Pawel Chodowiec
,
K. Gaj
,
P. Bellows
,
Brian Schott
Information Security Conference
2001
Corpus ID: 7768736
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE