2009 International Conference on Future Computer and Communication 2009
DOI: 10.1109/icfcc.2009.71
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced HMAC Based upon 3-D Rossler System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…As with any MAC, it may be utilized to validate both the authenticity and integrity of the message at the same time. Further, HMAC's cryptographic strength basically relies on the quality and size of the key, hash output length in bits, and the cryptographic strength of the chosen hash function [6], [7]. One of the well-known hash algorithms is MD5 due to its extensive availability and shorter length [8].…”
Section: Introductionmentioning
confidence: 99%
“…As with any MAC, it may be utilized to validate both the authenticity and integrity of the message at the same time. Further, HMAC's cryptographic strength basically relies on the quality and size of the key, hash output length in bits, and the cryptographic strength of the chosen hash function [6], [7]. One of the well-known hash algorithms is MD5 due to its extensive availability and shorter length [8].…”
Section: Introductionmentioning
confidence: 99%