Results 21 to 30 of about 72,952 (289)
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA). After critically analyzing the Hash-based Message Authentication Code (HMAC)
Francis G. Balazon
doaj +1 more source
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.
Mohamud Ahmed Jimale +6 more
doaj +1 more source
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection [PDF]
Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to ...
Chang, Ee-Chien, Fang, Chengfang
core +1 more source
A survey on cyber security for smart grid communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +1 more source
Digital signatures over HMAC entangled chains
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm [PDF]
We present a term rewrite system that formally models the Message Authenticator Algorithm (MAA), which was one of the first cryptographic functions for computing a Message Authentication Code and was adopted, between 1987 and 2001, in international ...
Hubert Garavel, Lina Marsso
doaj +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
On authentication codes based on orthogonal tables
The authentication codes resistant to messages imitation and substitution are investigated. The case when the probabilities of imitation and substitution reach the lower limits has been highlighted. Such authentication codes are called optimal.
Sergey M Ratseev, Olga I Cherevatenko
doaj +1 more source
EliMAC: Speeding Up LightMAC by around 20%
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are ...
Christoph Dobraunig +2 more
doaj +1 more source

