About 638 results
Open links in new tab
  1. HMAC - Wikipedia

    HMAC HMAC-SHA1 generation In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific …

  2. HKDF - Wikipedia

    HKDF is a simple key derivation function (KDF) based on the HMAC message authentication code. [1][2] It was initially proposed by its authors as a building block in various protocols and …

  3. Message authentication code - Wikipedia

    MAC algorithms can be constructed from other cryptographic primitives, like cryptographic hash functions (as in the case of HMAC) or from block cipher algorithms (OMAC, CCM, GCM, and …

  4. PBKDF2 - Wikipedia

    PBKDF2 applies a pseudorandom function, such as hash-based message authentication code (HMAC), to the input password or passphrase along with a salt value and repeats the process …

  5. HMAC-based one-time password - Wikipedia

    HMAC-based one-time password (HOTP) is a one-time password (OTP) algorithm based upon a Hash-based Message Authentication Code (HMAC). When a client attempts to access a server, …

  6. List of hash functions - Wikipedia

    List of hash functions This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.

  7. NIST SP 800-90A - Wikipedia

    The new hash functions from FIPS 180-4 were added in the discussion of hash-based [sp 3] In June 2015, NIST 800-90A Revision 1 (800-90Ar1) was released. The most notable change is the …

  8. Whirlpool (hash function) - Wikipedia

    [2] Research on the security analysis of the Whirlpool function however, has revealed that on average, the introduction of 8 random faults is sufficient to compromise the 512-bit Whirlpool …