Keying Hash Functions for Message Authentication
- 1 January 1996
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Performance analysis of MD5ACM SIGCOMM Computer Communication Review, 1995
- IP Authentication HeaderPublished by RFC Editor ,1995
- IP Authentication using Keyed MD5Published by RFC Editor ,1995
- Security Architecture for the Internet ProtocolPublished by RFC Editor ,1995
- Fast Software EncryptionPublished by Springer Nature ,1995
- Parallel collision search with application to hash functions and discrete logarithmsPublished by Association for Computing Machinery (ACM) ,1994
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Public-key cryptographyPublished by National Institute of Standards and Technology (NIST) ,1991
- How to construct random functionsJournal of the ACM, 1986