Results 271 to 280 of about 75,500 (332)

Approximate image message authentication codes

IEEE Transactions on Multimedia, 2001
This paper introduces approximate image message authentication codes (IMACs) for soft image authentication. The proposed approximate IMAC survives small to moderate image compression and it is capable of detecting and locating tampering. Techniques such as block averaging and smoothing, parallel approximate message authentication code (AMAC ...
null Liehua Xie   +2 more
openaire   +1 more source

QR Code Authentication with Embedded Message Authentication Code

Mobile Networks and Applications, 2016
Quick Response (QR) code is widely used nowadays but its authenticity is an open issue. Attackers can easily replace the original barcode by a modified one which is generated through the standard encoder. This paper proposes to embed the authentication data such as message authentication code and cryptographic signature for QR code authentication.
openaire   +1 more source

Message Authentication Codes (MACs)

2010
A Message Authentication Code (MAC), also known as a cryptographic checksum or a keyed hash function, is widely used in practice. In terms of security functionality, MACs share some properties with digital signatures, since they also provide message integrity and message authentication. However, unlike digital signatures, MACs are symmetric-key schemes
Christof Paar, Jan Pelzl
openaire   +1 more source

A Privacy Preserving Message Authentication Code

2015 5th International Conference on IT Convergence and Security (ICITCS), 2015
In this paper, we propose a new message authentication code which can preserve privacy of data. The proposed mechanism supports to verify data integrity from only partly information of the original data. In addition, it is proved to be chosen-message-attack secure and privacy-preserving.
Dang Hai Van, Nguyen Dinh Thuc
openaire   +1 more source

Updatable Signatures and Message Authentication Codes

2021
Cryptographic objects with updating capabilities have been proposed by Bellare, Goldreich and Goldwasser (CRYPTO’94) under the umbrella of incremental cryptography. They have recently seen increased interest, motivated by theoretical questions (Ananth et al., EC’17) as well as concrete practical motivations (Lehmann et al., EC’18; Groth et al.
Cini, Valerio   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy