Results 21 to 30 of about 75,500 (332)
Quantum message authentication codes [PDF]
This paper has been withdrawn because of an error in the proof of Lemma 1. Without Lemma 1, the result of the main theorem (with the same proof, but omitting the use of Lemma 1 to extend things to general attacks) only holds for attacks in which the attacker applies a tensor product of Pauli matrices (for qubits) or generalized Pauli matrices.
Howard Barnum
openaire +3 more sources
Algebraic Message Authentication Codes [PDF]
Not relevant ...
Abhinav Aggarwal
openaire +3 more sources
Binary phase hopping based spreading code authentication technique
Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due to their signal structures. The Spreading Code Authentication (SCA) technique is one of the GNSS message encryption identity authentication ...
Shenran Wang +3 more
doaj +1 more source
Graph design for data authentication over insecure communication channel
Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent.
H. Shabana, R. El-Shanawany, S.R. Halawa
doaj +1 more source
Randomly Flipped Chip based signal power authentication for GNSS civilian signals
The navigation signal authentication schemes protect GNSS services from spoofing attacks by attaching unforgeable information to signals. In this study, Randomly Flipped Chip based Signal Power Authentication (RFC‐SPA), is proposed to jointly ...
Yuan Muzi +4 more
doaj +1 more source
Tag Generation Using Chaotic Sequences for Physical-Layer Authentication
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista +3 more
doaj +1 more source
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG +3 more
doaj +3 more sources
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain +2 more
doaj +1 more source
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node.
Shaoyu Wang +5 more
doaj +1 more source
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers
Tweakable block ciphers (TBCs) have proven highly useful to boost the security guarantees of authentication schemes. In 2017, Cogliati et al. proposed two MACs combining TBC and universal hash functions: a nonce-based MAC called NaT and a deterministic ...
Wonseok Choi +6 more
doaj +3 more sources

