Results 1 to 10 of about 75,500 (332)

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: diamondPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj   +3 more sources

A TWOOA construction for multi-receiver multi-message authentication codes [PDF]

open access: hybridJournal of Mathematical Cryptology, 2008
A (k, n; w) multi-receiver multi-message authentication code allows a transmitter to broadcast up to w − 1 distinct authenticated messages to n receivers in such a way that (1) not only an opponent but also any up to k − 1 receivers cannot cheat any ...
Fuji-Hara Ryoh   +3 more
doaj   +2 more sources

Quantum authentication with unitary coding sets [PDF]

open access: yes, 2002
A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in ...
David J. Santos   +8 more
core   +2 more sources

Message authentication algorithm based on fully homomorphism MAC method

open access: yesDianzi Jishu Yingyong, 2018
There are many problems of security and authentication in communication channel with data transmission. After studying the fully homomorphism encryption and message authentication code(MAC) algorithm, this paper presents a scheme of message ...
Pan Zhao, Zhang Yuejun, Ding Dailu
doaj   +1 more source

Analysing and attacking the 4-way handshake of IEEE 802.11i standard [PDF]

open access: yes, 2014
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK).
Alabdulatif, A, Ma, X, Nolle, L
core   +1 more source

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces

open access: yesIEEE Access, 2022
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.
Mohamud Ahmed Jimale   +6 more
doaj   +1 more source

Aggregate Message Authentication Codes [PDF]

open access: yes, 2008
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender.
Jonathan Katz, Andrew Y. Lindell
openaire   +1 more source

Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection [PDF]

open access: yes, 2010
Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to ...
Chang, Ee-Chien, Fang, Chengfang
core   +1 more source

A survey on cyber security for smart grid communications [PDF]

open access: yes, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +1 more source

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Home - About - Disclaimer - Privacy