Timed Efficient Stream Loss-tolerant Authentication (TESLA)Ī.4. Keyed-Hash Message Authentication Code (HMAC)ĥ.20. Challenge-Handshake Authentication Protocol (CHAP)ĥ.19. The Advanced Encryption Standard (AES) and Rijndaelĥ.14. Public Key Certificates and Certification Authoritiesĥ.7.
Since that time, this paper has taken on a life of its own.ģ.5. © 1998-2021 � A much shorter version of this paper first appeared in Handbook on Local Area Networks (Auerbach, Sept.