Výsledky vyhledávání - Message authentication code algorithm

  1. 1

    Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security Autor Hussain, S. M. Suhail, Farooq, Shaik Mullapathi, Ustun, Taha Selim

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2019
    Vydáno v IEEE access (2019)
    “…) algorithms, such as Hash-based Message Authentication Code (HMAC) and Advanced Encryption Standard-Galois Message Authentication Code (AES-GMAC…”
    Získat plný text
    Journal Article
  2. 2

    The price of security in wireless sensor networks Autor Lee, Jongdeog, Kapitanova, Krasimira, Son, Sang H.

    ISSN: 1389-1286, 1872-7069
    Vydáno: Kidlington Elsevier B.V 03.12.2010
    “…: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms…”
    Získat plný text
    Journal Article
  3. 3

    Research and Implementation of Secure Upgrade Method for Embedded Control Software Autor CHEN Junbo, ZOU Junyang, ZHANG Tianyu

    ISSN: 2096-5427
    Vydáno: Editorial Office of Control and Information Technology 01.12.2024
    Vydáno v Kongzhi Yu Xinxi Jishu (01.12.2024)
    “… software upgrade methodology and process. A software signature and check method based on the hash-based message authentication code (HMAC…”
    Získat plný text
    Journal Article
  4. 4

    DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm Autor Noura, Hassan N., Couturier, Raphaël, Salman, Ola, Mazouzi, Kamel

    ISSN: 0920-8542, 1573-0484
    Vydáno: New York Springer US 01.08.2022
    Vydáno v The Journal of supercomputing (01.08.2022)
    “… Existing cryptographic algorithms, especially the Message Authentication Algorithms (MAAs) such as Hash Message Authentication Code…”
    Získat plný text
    Journal Article
  5. 5

    SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm Autor Echandouri, Bouchra, Omary, Fouzia, Ziani, Fatima Ezzahra, Sadak, Anas

    ISSN: 1930-1650, 1930-1669
    Vydáno: Hershey IGI Global 01.07.2018
    “… In this article, the authors propose a new cipher-based message authentication code (CMAC) algorithm. Their proposed…”
    Získat plný text
    Journal Article
  6. 6

    Implementation of message authentication code using DNA-LCG key and a novel hash algorithm Autor Sodhi, Gurpreet Kour, Gaba, Gurjot Singh, Kansal, Lavish, Bakkali, Mohamed El, Tubbal, Faisel Em

    ISSN: 2088-8708, 2088-8708
    Vydáno: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2019
    “… The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity…”
    Získat plný text
    Journal Article
  7. 7

    SDRP: secure and dynamic routing protocol for mobile ad-hoc networks Autor Ghosh, Uttam, Datta, Raja

    ISSN: 2047-4954, 2047-4962, 2047-4962
    Vydáno: Stevenage The Institution of Engineering and Technology 01.09.2014
    Vydáno v IET networks (01.09.2014)
    “… It makes use of signature and ‘Message Authentication Codealgorithms to provide end-to-end, hop-to-hop and whole-route authentications…”
    Získat plný text
    Journal Article
  8. 8

    A novel secured authentication model for LTE network system using BD-POA-HECC, HD-MAC, and PD-3WHP techniques Autor Sagar, Dasari, Saidireddy, Malgireddy

    ISSN: 0957-4174
    Vydáno: Elsevier Ltd 15.12.2024
    Vydáno v Expert systems with applications (15.12.2024)
    “…) user network is utilized by the largest population because of its adaptability with highly developed authentication and encryption models…”
    Získat plný text
    Journal Article
  9. 9

    An area-efficient implementation of a Message Authentication Code (MAC) algorithm for cryptographic systems Autor Jingjing Lan, Jun Zhou, Xin Liu

    ISSN: 2159-3450
    Vydáno: IEEE 01.11.2016
    Vydáno v TENCON ... IEEE Region Ten Conference (01.11.2016)
    “…In this paper, an area-efficient hardware implementation of the lightweight Chaskey algorithm is present…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Secure and Robust Two-Phase Image Authentication Autor Tabatabaei, Seyed Amir Hossein, Ur-Rehman, Obaid, Zivic, Natasa, Ruland, Christoph

    ISSN: 1520-9210, 1941-0077
    Vydáno: Piscataway IEEE 01.07.2015
    Vydáno v IEEE transactions on multimedia (01.07.2015)
    “…). The AMACs combine error- correcting codes with cryptographic primitives such as message authentication codes and symmetric encryption algorithms…”
    Získat plný text
    Journal Article
  11. 11

    Correlation power attack on a message authentication code based on SM3 Autor Yuan, Ye, Qu, Kai-ge, Wu, Li-ji, Ma, Jia-wei, Zhang, Xiang-min

    ISSN: 2095-9184, 2095-9230
    Vydáno: Hangzhou Zhejiang University Press 01.07.2019
    “…Hash-based message authentication code (HMAC) is widely used in authentication and message integrity…”
    Získat plný text
    Journal Article
  12. 12

    Design and implementation of multiple authentication schemes on navigation messages Autor Chunpeng, Liu, Wenhao, Dong, Ma, Maode, Shuang, Xiao

    ISSN: 1673-5447
    Vydáno: China Institute of Communications 01.09.2025
    Vydáno v China communications (01.09.2025)
    “…) spoofing attacks on UAVs, resulting in major security risks for UAVs. In order to cope with spoofing attacks, a navigation message authentication (NMA…”
    Získat plný text
    Journal Article
  13. 13

    Enhancing the Security of MANETs using Hash Algorithms Autor Ravilla, Dilli, Putta, Chandra Shekar Reddy

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2015
    Vydáno v Procedia computer science (2015)
    “… This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm…”
    Získat plný text
    Journal Article
  14. 14

    Message-Authentication Code Algorithms Autor St Denis, Tom

    ISBN: 1597491047, 9781597491044
    Vydáno: United States Elsevier Science & Technology Books 2006
    Vydáno v Cryptography for Developers (2006)
    Získat plný text
    Kapitola
  15. 15
  16. 16

    Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms Autor Adekunle, A.A., Woodhead, S.R.

    ISBN: 142445879X, 9781424458790
    Vydáno: IEEE 01.02.2010
    “…A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Securing IEEE 1588 messages with message authentication codes based on the KECCAK cryptographic algorithm implemented in FPGAs Autor Moreira, Naiara, Astarloa, Armando, Kretzschmar, Uli, Lazaro, Jesus, Molina, Elias

    ISSN: 2163-5137
    Vydáno: IEEE 01.06.2014
    “… But security is only defined as an optional extension and presents several vulnerabilities. In particular, the cryptographic algorithms specified in the standard…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Routing Using Trust Based System with SHA-2 Authentication Autor Ravilla, Dilli, Putta, Chandra Shekar Reddy

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2015
    Vydáno v Procedia computer science (2015)
    “…), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and a hashing algorithm, keyed-Hash Message Authentication Code…”
    Získat plný text
    Journal Article
  19. 19

    The Parallel CMAC Authentication Algorithm Autor Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Liu, Jianwei, Xu, Tongge

    ISSN: 2472-8489
    Vydáno: IEEE 01.06.2019
    “… The authentication algorithm provides services for user validation or authentication. The Message Authentication Code (MAC…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Chapter 6 - MessageAuthentication Code Algorithms Autor Tom St Denis, Simon Johnson

    ISBN: 1597491047, 9781597491044
    Vydáno: Syngress 2006
    Vydáno v Cryptography for Developers (2006)
    “…Message Authentication Code (MAC) algorithms are a fairly crucial component of most online protocols…”
    Získat plný text
    Kapitola