Results 1 to 10 of about 75,500 (332)
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj +3 more sources
A TWOOA construction for multi-receiver multi-message authentication codes [PDF]
A (k, n; w) multi-receiver multi-message authentication code allows a transmitter to broadcast up to w − 1 distinct authenticated messages to n receivers in such a way that (1) not only an opponent but also any up to k − 1 receivers cannot cheat any ...
Fuji-Hara Ryoh +3 more
doaj +2 more sources
Quantum authentication with unitary coding sets [PDF]
A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in ...
David J. Santos +8 more
core +2 more sources
Message authentication algorithm based on fully homomorphism MAC method
There are many problems of security and authentication in communication channel with data transmission. After studying the fully homomorphism encryption and message authentication code(MAC) algorithm, this paper presents a scheme of message ...
Pan Zhao, Zhang Yuejun, Ding Dailu
doaj +1 more source
Analysing and attacking the 4-way handshake of IEEE 802.11i standard [PDF]
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK).
Alabdulatif, A, Ma, X, Nolle, L
core +1 more source
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.
Mohamud Ahmed Jimale +6 more
doaj +1 more source
Aggregate Message Authentication Codes [PDF]
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender.
Jonathan Katz, Andrew Y. Lindell
openaire +1 more source
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection [PDF]
Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to ...
Chang, Ee-Chien, Fang, Chengfang
core +1 more source
A survey on cyber security for smart grid communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source

