Results 21 to 30 of about 72,952 (289)

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: yesPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA). After critically analyzing the Hash-based Message Authentication Code (HMAC)
Francis G. Balazon
doaj   +1 more source

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces

open access: yesIEEE Access, 2022
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.
Mohamud Ahmed Jimale   +6 more
doaj   +1 more source

Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection [PDF]

open access: yes, 2010
Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to ...
Chang, Ee-Chien, Fang, Chengfang
core   +1 more source

A survey on cyber security for smart grid communications [PDF]

open access: yes, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +1 more source

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
We present a term rewrite system that formally models the Message Authenticator Algorithm (MAA), which was one of the first cryptographic functions for computing a Message Authentication Code and was adopted, between 1987 and 2001, in international ...
Hubert Garavel, Lina Marsso
doaj   +1 more source

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

On authentication codes based on orthogonal tables

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2014
The authentication codes resistant to messages imitation and substitution are investigated. The case when the probabilities of imitation and substitution reach the lower limits has been highlighted. Such authentication codes are called optimal.
Sergey M Ratseev, Olga I Cherevatenko
doaj   +1 more source

EliMAC: Speeding Up LightMAC by around 20%

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs are ...
Christoph Dobraunig   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy