Results 281 to 290 of about 75,500 (332)
Some of the next articles are maybe not open access.

Key-Indistinguishable Message Authentication Codes

2014
While standard message authentication codes (MACs) guarantee authenticity of messages, they do not, in general, guarantee the anonymity of the sender and the recipient. For example it may be easy for an observer to determine whether or not two authenticated messages were sent by the same party even without any information about the secret key used ...
Joël Alwen   +4 more
openaire   +1 more source

Quantum Network Coding with Message Authentication

2020
Quantum network coding is vulnerable to pollution attacks, especially when using classical channel as an auxiliary resource. In this chapter, we introduce a secure quantum network coding scheme against pollution attacks.
Tao Shang, Jianwei Liu
openaire   +1 more source

Vectorization of Poly1305 Message Authentication Code

2015 12th International Conference on Information Technology - New Generations, 2015
This paper describes software optimizations for the message authentication code Poly1305. We leverage the wide vectorization capabilities of the new AVX2 architecture, to speed up the authenticator generation on the latest x86_64 processors. In addition, we show how to apply vectorization for the future AVX-512 architecture to achieve a further speedup.
Martin Goll, Shay Gueron
openaire   +1 more source

A Parallelizable Message Authentication Code

Journal of Software, 2007
This paper defines and analyzes a fully deterministic parallelizable block-cipher mode of operation for message authentication— DPMAC (deterministic parallelizable message authentication code). DPMAC is constructed based on a 128-bit block cipher, works for strings of any bit length, and employs a single block-cipher key.
openaire   +1 more source

Message Authentication with Manipulation Detection Code

1983 IEEE Symposium on Security and Privacy, 1983
In many applications of cryptography, assuring the authenticity of communications is as important as protecting their secrecy. A well known and secure method of providing message authentication is to compute a Message Authentication Code (MAC) by encrypting the message.
R.R. Jueneman, S.M. Matyas, C.H. Meyer
openaire   +1 more source

Forward-secure aggregate message authentication code

IET International Communication Conference on Wireless Mobile & Computing (CCWMC 2009), 2009
As wireless sensor networks (WSNs) are usually deployed in remote and hostile environments to transmit sensitive information, sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and integrity. Data integrity is guaranteed by the message authentication code (MAC).
null Jun He, null Hai-feng Qian
openaire   +1 more source

Throughput Optimization of the Cipher Message Authentication Code

2007 15th International Conference on Digital Signal Processing, 2007
A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a different MAC will be produced if the message has changed - as well as its authenticity - because only someone who knows the secret key could be able to generate a valid MAC.
Selimis, G.   +3 more
openaire   +2 more sources

Message Authentication Code

2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +1 more source

History-Free Aggregate Message Authentication Codes

2010
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MAC. These schemes reduce the communication overhead significantly and are therefore a promising approach to achieve authenticated communication in mobile ad-hoc networks ...
Oliver Eikemeier   +6 more
openaire   +1 more source

Message Authentication Codes

2020
Jonathan Katz, Yehuda Lindell
openaire   +1 more source

Home - About - Disclaimer - Privacy