Suchergebnisse - Message authentication code algorithm

  1. 1

    Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security von Hussain, S. M. Suhail, Farooq, Shaik Mullapathi, Ustun, Taha Selim

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2019
    Veröffentlicht in IEEE access (2019)
    “… ) algorithms, such as Hash-based Message Authentication Code (HMAC) and Advanced Encryption Standard-Galois Message Authentication Code (AES-GMAC …”
    Volltext
    Journal Article
  2. 2

    The price of security in wireless sensor networks von Lee, Jongdeog, Kapitanova, Krasimira, Son, Sang H.

    ISSN: 1389-1286, 1872-7069
    Veröffentlicht: Kidlington Elsevier B.V 03.12.2010
    Veröffentlicht in Computer networks (Amsterdam, Netherlands : 1999) (03.12.2010)
    “… : encryption algorithms, modes of operation for block ciphers, and message authentication algorithms …”
    Volltext
    Journal Article
  3. 3

    Research and Implementation of Secure Upgrade Method for Embedded Control Software von CHEN Junbo, ZOU Junyang, ZHANG Tianyu

    ISSN: 2096-5427
    Veröffentlicht: Editorial Office of Control and Information Technology 01.12.2024
    Veröffentlicht in Kongzhi Yu Xinxi Jishu (01.12.2024)
    “… software upgrade methodology and process. A software signature and check method based on the hash-based message authentication code (HMAC …”
    Volltext
    Journal Article
  4. 4

    DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm von Noura, Hassan N., Couturier, Raphaël, Salman, Ola, Mazouzi, Kamel

    ISSN: 0920-8542, 1573-0484
    Veröffentlicht: New York Springer US 01.08.2022
    Veröffentlicht in The Journal of supercomputing (01.08.2022)
    “… Existing cryptographic algorithms, especially the Message Authentication Algorithms (MAAs) such as Hash Message Authentication Code …”
    Volltext
    Journal Article
  5. 5

    SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm von Echandouri, Bouchra, Omary, Fouzia, Ziani, Fatima Ezzahra, Sadak, Anas

    ISSN: 1930-1650, 1930-1669
    Veröffentlicht: Hershey IGI Global 01.07.2018
    “… In this article, the authors propose a new cipher-based message authentication code (CMAC) algorithm. Their proposed …”
    Volltext
    Journal Article
  6. 6

    Implementation of message authentication code using DNA-LCG key and a novel hash algorithm von Sodhi, Gurpreet Kour, Gaba, Gurjot Singh, Kansal, Lavish, Bakkali, Mohamed El, Tubbal, Faisel Em

    ISSN: 2088-8708, 2088-8708
    Veröffentlicht: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2019
    “… The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity …”
    Volltext
    Journal Article
  7. 7

    SDRP: secure and dynamic routing protocol for mobile ad-hoc networks von Ghosh, Uttam, Datta, Raja

    ISSN: 2047-4954, 2047-4962, 2047-4962
    Veröffentlicht: Stevenage The Institution of Engineering and Technology 01.09.2014
    Veröffentlicht in IET networks (01.09.2014)
    “… It makes use of signature and ‘Message Authentication Codealgorithms to provide end-to-end, hop-to-hop and whole-route authentications …”
    Volltext
    Journal Article
  8. 8

    A novel secured authentication model for LTE network system using BD-POA-HECC, HD-MAC, and PD-3WHP techniques von Sagar, Dasari, Saidireddy, Malgireddy

    ISSN: 0957-4174
    Veröffentlicht: Elsevier Ltd 15.12.2024
    Veröffentlicht in Expert systems with applications (15.12.2024)
    “… ) user network is utilized by the largest population because of its adaptability with highly developed authentication and encryption models …”
    Volltext
    Journal Article
  9. 9

    An area-efficient implementation of a Message Authentication Code (MAC) algorithm for cryptographic systems von Jingjing Lan, Jun Zhou, Xin Liu

    ISSN: 2159-3450
    Veröffentlicht: IEEE 01.11.2016
    Veröffentlicht in TENCON ... IEEE Region Ten Conference (01.11.2016)
    “… In this paper, an area-efficient hardware implementation of the lightweight Chaskey algorithm is present …”
    Volltext
    Tagungsbericht
  10. 10

    Secure and Robust Two-Phase Image Authentication von Tabatabaei, Seyed Amir Hossein, Ur-Rehman, Obaid, Zivic, Natasa, Ruland, Christoph

    ISSN: 1520-9210, 1941-0077
    Veröffentlicht: Piscataway IEEE 01.07.2015
    Veröffentlicht in IEEE transactions on multimedia (01.07.2015)
    “… ). The AMACs combine error- correcting codes with cryptographic primitives such as message authentication codes and symmetric encryption algorithms …”
    Volltext
    Journal Article
  11. 11

    Correlation power attack on a message authentication code based on SM3 von Yuan, Ye, Qu, Kai-ge, Wu, Li-ji, Ma, Jia-wei, Zhang, Xiang-min

    ISSN: 2095-9184, 2095-9230
    Veröffentlicht: Hangzhou Zhejiang University Press 01.07.2019
    “… Hash-based message authentication code (HMAC) is widely used in authentication and message integrity …”
    Volltext
    Journal Article
  12. 12

    Design and implementation of multiple authentication schemes on navigation messages von Chunpeng, Liu, Wenhao, Dong, Ma, Maode, Shuang, Xiao

    ISSN: 1673-5447
    Veröffentlicht: China Institute of Communications 01.09.2025
    Veröffentlicht in China communications (01.09.2025)
    “… ) spoofing attacks on UAVs, resulting in major security risks for UAVs. In order to cope with spoofing attacks, a navigation message authentication (NMA …”
    Volltext
    Journal Article
  13. 13

    Enhancing the Security of MANETs using Hash Algorithms von Ravilla, Dilli, Putta, Chandra Shekar Reddy

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2015
    Veröffentlicht in Procedia computer science (2015)
    “… This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm …”
    Volltext
    Journal Article
  14. 14

    Message-Authentication Code Algorithms von St Denis, Tom

    ISBN: 1597491047, 9781597491044
    Veröffentlicht: United States Elsevier Science & Technology Books 2006
    Veröffentlicht in Cryptography for Developers (2006)
    Volltext
    Buchkapitel
  15. 15
  16. 16

    Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms von Adekunle, A.A., Woodhead, S.R.

    ISBN: 142445879X, 9781424458790
    Veröffentlicht: IEEE 01.02.2010
    “… A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC …”
    Volltext
    Tagungsbericht
  17. 17

    Securing IEEE 1588 messages with message authentication codes based on the KECCAK cryptographic algorithm implemented in FPGAs von Moreira, Naiara, Astarloa, Armando, Kretzschmar, Uli, Lazaro, Jesus, Molina, Elias

    ISSN: 2163-5137
    Veröffentlicht: IEEE 01.06.2014
    “… But security is only defined as an optional extension and presents several vulnerabilities. In particular, the cryptographic algorithms specified in the standard …”
    Volltext
    Tagungsbericht
  18. 18

    Routing Using Trust Based System with SHA-2 Authentication von Ravilla, Dilli, Putta, Chandra Shekar Reddy

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2015
    Veröffentlicht in Procedia computer science (2015)
    “… ), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and a hashing algorithm, keyed-Hash Message Authentication Code …”
    Volltext
    Journal Article
  19. 19

    The Parallel CMAC Authentication Algorithm von Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Liu, Jianwei, Xu, Tongge

    ISSN: 2472-8489
    Veröffentlicht: IEEE 01.06.2019
    “… The authentication algorithm provides services for user validation or authentication. The Message Authentication Code (MAC …”
    Volltext
    Tagungsbericht
  20. 20

    Chapter 6 - MessageAuthentication Code Algorithms von Tom St Denis, Simon Johnson

    ISBN: 1597491047, 9781597491044
    Veröffentlicht: Syngress 2006
    Veröffentlicht in Cryptography for Developers (2006)
    “… Message Authentication Code (MAC) algorithms are a fairly crucial component of most online protocols …”
    Volltext
    Buchkapitel