-
1
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment
Published 2021-01-01Subjects: “…HMAC-LSH256…”
Get full text
Article -
2
Digital signatures over HMAC entangled chains
Published 2022-08-01Subjects: “…HMAC…”
Get full text
Article -
3
Two Factor Authentication Based Generated One Time Password
Published 2015-03-01Subjects: Get full text
Article -
4
A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm
Published 2024-07-01Subjects: Get full text
Article -
5
A novel crypto technique based ciphertext shifting
Published 2020-07-01Subjects: Get full text
Article -
6
Deep Learning-based Side Channel Attack on HMAC SM3
Published 2021-03-01Subjects: Get full text
Article -
7
-
8
Design and Testing of a Computer Security Layer for the LIN Bus
Published 2022-09-01Subjects: Get full text
Article -
9
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Published 2016Subjects: Get full text
Get full text
Journal Article -
10
NeoStarling: An Efficient and Scalable Collaborative Blockchain-Enabled Obstacle Mapping Solution for Vehicular Environments
Published 2023-08-01Subjects: Get full text
Article -
11
Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Published 2018-06-01Subjects: “…HMAC, JSON Web Token, RESTful, SHA-512, Web Service…”
Get full text
Article -
12
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
Published 2023-06-01Subjects: Get full text
Article -
13
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
Published 2018-02-01Subjects: Get full text
Article -
14
Dynamic Response Analysis of Rutting Resistance Performance of High Modulus Asphalt Concrete Pavement
Published 2018-12-01Subjects: “…HMAC…”
Get full text
Article -
15
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
Published 2020-08-01Subjects: Get full text
Article -
16
Efficient Optimization of MS Office 2013+ Password Cracking and PBKDF2-HMAC-SHA2 on GPUs
Published 2024-01-01Subjects: “…HMAC…”
Get full text
Article -
17
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
Published 2022-01-01Subjects: Get full text
Article -
18
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules
Published 2019-09-01Subjects: Get full text
Article -
19
Use of Recycled Asphalt and Waste Materials in Production of High-Performance Asphalt Mixtures
Published 2022-12-01Subjects: Get full text
Article -
20
Laboratory Evaluation of the Properties of Dense Graded Asphalt Mixtures Containing Waste Glass Fibre and Crumb Rubber
Published 2022-06-01Subjects: Get full text
Article