Search Results - "Message authentication code algorithm"

Refine Results
  1. 1

    The price of security in wireless sensor networks by Lee, Jongdeog, Kapitanova, Krasimira, Son, Sang H.

    ISSN: 1389-1286, 1872-7069
    Published: Kidlington Elsevier B.V 03.12.2010
    “…With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a…”
    Get full text
    Journal Article
  2. 2

    Rotational Differential-Linear Attack on Chaskey by Qin, Yuan, Wang, Gaoli, Zhang, Guoyan

    ISSN: 1939-0114, 1939-0122
    Published: London Hindawi 25.08.2022
    Published in Security and communication networks (25.08.2022)
    “… In this paper, we analyse the message authentication code algorithm—Chaskey—by using rotational differential-linear attack and using partitioning technique for key recovery…”
    Get full text
    Journal Article
  3. 3

    SDRP: secure and dynamic routing protocol for mobile ad-hoc networks by Ghosh, Uttam, Datta, Raja

    ISSN: 2047-4954, 2047-4962, 2047-4962
    Published: Stevenage The Institution of Engineering and Technology 01.09.2014
    Published in IET networks (01.09.2014)
    “… It makes use of signature and ‘Message Authentication Codealgorithms to provide end-to-end, hop-to-hop and whole-route authentications…”
    Get full text
    Journal Article
  4. 4

    Message-Authentication Code Algorithms by St Denis, Tom

    ISBN: 1597491047, 9781597491044
    Published: United States Elsevier Science & Technology Books 2006
    Published in Cryptography for Developers (2006)
    Get full text
    Book Chapter
  5. 5

    Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms by Adekunle, A.A., Woodhead, S.R.

    ISBN: 142445879X, 9781424458790
    Published: IEEE 01.02.2010
    “…A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC) algorithm based on symmetric key…”
    Get full text
    Conference Proceeding
  6. 6

    Chapter 6 - MessageAuthentication Code Algorithms by Tom St Denis, Simon Johnson

    ISBN: 1597491047, 9781597491044
    Published: Syngress 2006
    Published in Cryptography for Developers (2006)
    “…Message Authentication Code (MAC) algorithms are a fairly crucial component of most online protocols. They ensure the authenticity of the message between two…”
    Get full text
    Book Chapter
  7. 7

    IMPLEMENTASI AUTHENTICATION & AUTHORIZATION BERBASIS JWT PADA SISTEM PENGELOLAAN PERKULIAHAN MENGGUNAKAN ALGORITMA HMAC by Setiawan, Erik Rio

    ISSN: 1907-6223, 2579-3497
    Published: 27.07.2025
    Published in Multitek Indonesia : jurnal ilmiah (27.07.2025)
    “…AbstrakKeamanan dan kerahasiaan data menjadi hal yang sangat penting karena data tersebut bisa digunakan oleh orang yang tidak bertanggung jawab untuk berbuat…”
    Get full text
    Journal Article
  8. 8

    3 B (Block Byte Bit) Cipher Algorithm for Secure Socket Layer by Geum, Yong-Pil

    ISSN: 2770-8209
    Published: IEEE 23.05.2023
    “…) algorithm to prevent from being eavesdropped, HMAC(Hash Message Authentication Code) algorithm to create digital signature using a shared secret key…”
    Get full text
    Conference Proceeding
  9. 9

    Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks by Inagaki, Saya, Yang, Mingyu, Li, Yang, Sakiyama, Kazuo, Hara-Azumi, Yuko

    ISSN: 1948-3295
    Published: IEEE 06.04.2022
    “…In this paper, four different versions of FPGA-based hardware implementation for Chaskey-12, a lightweight message authentication code algorithm suitable for resource-constrained devices…”
    Get full text
    Conference Proceeding
  10. 10

    Secure SMS System for E-Commerce Applications by Ibrahim, Mahmood Khalel, Ameen, Wasan Zaki

    ISSN: 2231-508X, 2347-3789
    Published: 01.04.2014
    “… with exchanging key securely through unsecure channel. The proposed system provides the major security services which are Authenticity, Integrity and Confidentiality, by implementing Zero Knowledge Proof for authenticity, keyed message authentication…”
    Get full text
    Journal Article
  11. 11

    The Message Authentication Code Based on Universal Hashing by T. A. Bilyk, A. U. Nesterenko

    ISSN: 2074-7128, 2074-7136
    Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2012
    “… The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article…”
    Get full text
    Journal Article
  12. 12

    Cyber security strategies based on HMAC in electric power remote monitoring and control system by Huang, Meng-Jie, Xu, Bu-Gong

    ISSN: 1674-3415
    Published: 01.10.2011
    Published in Dianli Xitong Baohu yu Kongzhi (01.10.2011)
    “…In order to solve cyber security problems in electric power remote monitoring and control system, a scheme based on Hash message authentication code algorithm (HMAC) is introduced…”
    Get full text
    Journal Article
  13. 13

    Host’s source address verification based on stream authentication in the IPv6 access subnet by Yue CHEN, Hong-yong JIA, Peng-xu TAN, Jing SHAO

    ISSN: 1000-436X
    Published: Editorial Department of Journal on Communications 01.01.2013
    Published in Tongxin Xuebao (01.01.2013)
    “… source address verification for packet stream was achieved through message authentication code algorithm and stream…”
    Get full text
    Journal Article
  14. 14

    Host's source address verification based on stream authentication in the IPv6 access subnet by Chen, Yue, Jia, Hong-Yong, Tan, Peng-Xu, Shao, Jing

    ISSN: 1000-436X
    Published: Editorial Department of Journal on Communications 01.01.2013
    Published in Tongxin Xuebao (01.01.2013)
    “… The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm…”
    Get full text
    Journal Article
  15. 15

    基于流认证的 IPv6接入子网主机源地址验证 by 陈越, 贾洪勇, 谭鹏许, 邵婧

    ISSN: 1000-436X
    Published: 解放军信息工程大学 网络空间安全学院,河南 郑州 450004 2013
    Published in 通信学报 (2013)
    “…TP393.08; 提出了一种以密码学方法实现的 IPv6接入子网主机高速源地址验证方案.把主机 MAC 地址作为身份同主机公钥相绑定,利用密码生成地址算法从主机公钥衍生出 IPv6接入…”
    Get full text
    Journal Article
  16. 16

    블록 암호 알고리즘을 애용한 MAC 분석 by 서창호, 윤보현, 맹승렬, Seo Chang-Ho, Yun Bo-Hyun, Maeng Sung-Reol

    ISSN: 1598-849X, 2383-9945
    Published: 2005
    “…This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message…”
    Get full text
    Journal Article
  17. 17

    블록 암호 알고리즘을 이용한 MAC 분석 by 서창호(Chang-Ho Seo), 윤보현(Bo-Hyun Yun), 맹승렬(Sung-Reol Maeng)

    ISSN: 1598-849X, 2383-9945
    Published: 한국컴퓨터정보학회 2005
    “…(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message…”
    Get full text
    Journal Article
  18. 18

    Information security with message authentication code by T A Bilyk, A A Vnukov

    ISSN: 2312-8143, 2312-8151
    Published: Peoples’ Friendship University of Russia (RUDN University) 01.06.2012
    “…This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties…”
    Get full text
    Journal Article
  19. 19

    On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques by Adekunle, A.A., Woodhead, S.R.

    ISBN: 9780769537863, 0769537863
    ISSN: 2161-2889
    Published: IEEE 01.09.2009
    “…Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC…”
    Get full text
    Conference Proceeding
  20. 20

    Energy efficient authentication strategies for network coding by Apavatjrut, Anya, Znaidi, Wassim, Fraboulet, Antoine, Goursaud, Claire, Jaffrès-Runser, Katia, Lauradoux, Cédric, Minier, Marine

    ISSN: 1532-0626, 1532-0634
    Published: Chichester, UK John Wiley & Sons, Ltd 01.07.2012
    Published in Concurrency and computation (01.07.2012)
    “… We investigate different strategies based on message authentication codes algorithms (MACs) to thwart these attacks…”
    Get full text
    Journal Article