Suchergebnisse - Message authentication code algorithm
-
1
Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2019Veröffentlicht in IEEE access (2019)“… ) algorithms, such as Hash-based Message Authentication Code (HMAC) and Advanced Encryption Standard-Galois Message Authentication Code (AES-GMAC …”
Volltext
Journal Article -
2
The price of security in wireless sensor networks
ISSN: 1389-1286, 1872-7069Veröffentlicht: Kidlington Elsevier B.V 03.12.2010Veröffentlicht in Computer networks (Amsterdam, Netherlands : 1999) (03.12.2010)“… : encryption algorithms, modes of operation for block ciphers, and message authentication algorithms …”
Volltext
Journal Article -
3
Research and Implementation of Secure Upgrade Method for Embedded Control Software
ISSN: 2096-5427Veröffentlicht: Editorial Office of Control and Information Technology 01.12.2024Veröffentlicht in Kongzhi Yu Xinxi Jishu (01.12.2024)“… software upgrade methodology and process. A software signature and check method based on the hash-based message authentication code (HMAC …”
Volltext
Journal Article -
4
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm
ISSN: 0920-8542, 1573-0484Veröffentlicht: New York Springer US 01.08.2022Veröffentlicht in The Journal of supercomputing (01.08.2022)“… Existing cryptographic algorithms, especially the Message Authentication Algorithms (MAAs) such as Hash Message Authentication Code …”
Volltext
Journal Article -
5
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm
ISSN: 1930-1650, 1930-1669Veröffentlicht: Hershey IGI Global 01.07.2018Veröffentlicht in International journal of information security and privacy (01.07.2018)“… In this article, the authors propose a new cipher-based message authentication code (CMAC) algorithm. Their proposed …”
Volltext
Journal Article -
6
Implementation of message authentication code using DNA-LCG key and a novel hash algorithm
ISSN: 2088-8708, 2088-8708Veröffentlicht: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2019Veröffentlicht in International journal of electrical and computer engineering (Malacca, Malacca) (01.02.2019)“… The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity …”
Volltext
Journal Article -
7
SDRP: secure and dynamic routing protocol for mobile ad-hoc networks
ISSN: 2047-4954, 2047-4962, 2047-4962Veröffentlicht: Stevenage The Institution of Engineering and Technology 01.09.2014Veröffentlicht in IET networks (01.09.2014)“… It makes use of signature and ‘Message Authentication Code’ algorithms to provide end-to-end, hop-to-hop and whole-route authentications …”
Volltext
Journal Article -
8
A novel secured authentication model for LTE network system using BD-POA-HECC, HD-MAC, and PD-3WHP techniques
ISSN: 0957-4174Veröffentlicht: Elsevier Ltd 15.12.2024Veröffentlicht in Expert systems with applications (15.12.2024)“… ) user network is utilized by the largest population because of its adaptability with highly developed authentication and encryption models …”
Volltext
Journal Article -
9
An area-efficient implementation of a Message Authentication Code (MAC) algorithm for cryptographic systems
ISSN: 2159-3450Veröffentlicht: IEEE 01.11.2016Veröffentlicht in TENCON ... IEEE Region Ten Conference (01.11.2016)“… In this paper, an area-efficient hardware implementation of the lightweight Chaskey algorithm is present …”
Volltext
Tagungsbericht -
10
Secure and Robust Two-Phase Image Authentication
ISSN: 1520-9210, 1941-0077Veröffentlicht: Piscataway IEEE 01.07.2015Veröffentlicht in IEEE transactions on multimedia (01.07.2015)“… ). The AMACs combine error- correcting codes with cryptographic primitives such as message authentication codes and symmetric encryption algorithms …”
Volltext
Journal Article -
11
Correlation power attack on a message authentication code based on SM3
ISSN: 2095-9184, 2095-9230Veröffentlicht: Hangzhou Zhejiang University Press 01.07.2019Veröffentlicht in Frontiers of information technology & electronic engineering (01.07.2019)“… Hash-based message authentication code (HMAC) is widely used in authentication and message integrity …”
Volltext
Journal Article -
12
Design and implementation of multiple authentication schemes on navigation messages
ISSN: 1673-5447Veröffentlicht: China Institute of Communications 01.09.2025Veröffentlicht in China communications (01.09.2025)“… ) spoofing attacks on UAVs, resulting in major security risks for UAVs. In order to cope with spoofing attacks, a navigation message authentication (NMA …”
Volltext
Journal Article -
13
Enhancing the Security of MANETs using Hash Algorithms
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2015Veröffentlicht in Procedia computer science (2015)“… This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm …”
Volltext
Journal Article -
14
Message-Authentication Code Algorithms
ISBN: 1597491047, 9781597491044Veröffentlicht: United States Elsevier Science & Technology Books 2006Veröffentlicht in Cryptography for Developers (2006)Volltext
Buchkapitel -
15
Combination of Hybrid Cryptography In One Time Pad (OTP) Algorithm And Keyed-Hash Message Authentication Code (HMAC) In Securing The Whatsapp Communication Application
ISSN: 2721-3838, 2721-3838Veröffentlicht: 30.03.2020Veröffentlicht in Journal of Computer Science, Information Technology and Telecommunication Engineering (30.03.2020)Volltext
Journal Article -
16
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms
ISBN: 142445879X, 9781424458790Veröffentlicht: IEEE 01.02.2010Veröffentlicht in 2010 International Conference on Availability, Reliability, and Security (01.02.2010)“… A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC …”
Volltext
Tagungsbericht -
17
Securing IEEE 1588 messages with message authentication codes based on the KECCAK cryptographic algorithm implemented in FPGAs
ISSN: 2163-5137Veröffentlicht: IEEE 01.06.2014Veröffentlicht in Proceedings of the IEEE International Symposium on Industrial Electronics (Online) (01.06.2014)“… But security is only defined as an optional extension and presents several vulnerabilities. In particular, the cryptographic algorithms specified in the standard …”
Volltext
Tagungsbericht -
18
Routing Using Trust Based System with SHA-2 Authentication
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2015Veröffentlicht in Procedia computer science (2015)“… ), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and a hashing algorithm, keyed-Hash Message Authentication Code …”
Volltext
Journal Article -
19
The Parallel CMAC Authentication Algorithm
ISSN: 2472-8489Veröffentlicht: IEEE 01.06.2019Veröffentlicht in Proceedings (International Conference on Communication Software and Networks) (01.06.2019)“… The authentication algorithm provides services for user validation or authentication. The Message Authentication Code (MAC …”
Volltext
Tagungsbericht -
20
Chapter 6 - Message—Authentication Code Algorithms
ISBN: 1597491047, 9781597491044Veröffentlicht: Syngress 2006Veröffentlicht in Cryptography for Developers (2006)“… Message Authentication Code (MAC) algorithms are a fairly crucial component of most online protocols …”
Volltext
Buchkapitel

