Results 11 to 20 of about 75,500 (332)

Message Authentication Code over a wiretap channel [PDF]

open access: green2015 IEEE International Symposium on Information Theory (ISIT), 2015
Message Authentication Code (MAC) is a keyed function $f_K$ such that when Alice, who shares the secret $K$ with Bob, sends $f_K(M)$ to the latter, Bob will be assured of the integrity and authenticity of $M$. Traditionally, it is assumed that the channel is noiseless. However, Maurer showed that in this case an attacker can succeed with probability $2^
Chen, Dajiang   +2 more
core   +5 more sources

Novel Hardware Implementation of the Cipher Message Authentication Code [PDF]

open access: hybridJournal of Computer Systems, Networks, and Communications, 2008
A new algorithm for producing message authenticating codes (MACs) was recently proposed by NIST. The MAC protects both a message's integrity—by ensuring that a different MAC will be produced if the message has changed—as well as its authenticity because ...
H. E. Michail   +4 more
doaj   +2 more sources

Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing [PDF]

open access: goldIEEE Access, 2020
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj   +2 more sources

The Poly1305-AES Message-Authentication Code [PDF]

open access: green, 2005
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length message, using a 16-byte AES key, a 16-byte additional key, and a 16-byte nonce. The security of Poly1305-AES is very close to the security of AES; the security gap is at most 14D⌈
Daniel J. Bernstein
openaire   +4 more sources

A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things [PDF]

open access: yesSensors
The Internet of Medical Things represents a pivotal application of Internet of Things technology in Healthcare 4.0, offering substantial practical benefits in enhancing medical quality, reducing costs, and minimizing errors.
Feihong Xu   +3 more
doaj   +2 more sources

Cryptanalysis of message authentication codes [PDF]

open access: green, 1998
This paper gives a survey of attacks on Message Authentication Codes (MACS). First it defines the required security properties. Next it describes generic forgery and key recovery attacks on MACS. Subsequently an overview is presented of most MAC constructions and on attacks on these algorithms.
Bart Preneel
openaire   +3 more sources

CAN-MM: Multiplexed Message Authentication Code for Controller Area Network Message Authentication in Road Vehicles [PDF]

open access: hybridIEEE Transactions on Vehicular Technology
in IEEE Transactions on Vehicular ...
Oberti, Franco   +5 more
openaire   +4 more sources

Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks

open access: goldInternational Journal of Distributed Sensor Networks, 2015
Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-and-forward transmission paradigm.
Alireza Esfahani   +4 more
doaj   +2 more sources

Information security with message authentication code

open access: yesRUDN Journal of Engineering Research, 2012
This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on.
T A Bilyk, A A Vnukov
doaj   +1 more source

Differential Attack on Message Authentication Codes [PDF]

open access: bronze, 1994
We discuss the security of Message Authentication Code (MAC) schemes from the viewpoint of differential attack, and propose an attack that is effective against DES-MAC and FEAL-MAC. The attack derives the secret authentication key in the chosen plaintext scenario.
Kazuo Ohta, Mitsuru Matsui
openaire   +3 more sources

Home - About - Disclaimer - Privacy