Search Results - "Message authentication code algorithm"
-
1
The price of security in wireless sensor networks
ISSN: 1389-1286, 1872-7069Published: Kidlington Elsevier B.V 03.12.2010Published in Computer networks (Amsterdam, Netherlands : 1999) (03.12.2010)“…With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a…”
Get full text
Journal Article -
2
Rotational Differential-Linear Attack on Chaskey
ISSN: 1939-0114, 1939-0122Published: London Hindawi 25.08.2022Published in Security and communication networks (25.08.2022)“… In this paper, we analyse the message authentication code algorithm—Chaskey—by using rotational differential-linear attack and using partitioning technique for key recovery…”
Get full text
Journal Article -
3
SDRP: secure and dynamic routing protocol for mobile ad-hoc networks
ISSN: 2047-4954, 2047-4962, 2047-4962Published: Stevenage The Institution of Engineering and Technology 01.09.2014Published in IET networks (01.09.2014)“… It makes use of signature and ‘Message Authentication Code’ algorithms to provide end-to-end, hop-to-hop and whole-route authentications…”
Get full text
Journal Article -
4
Message-Authentication Code Algorithms
ISBN: 1597491047, 9781597491044Published: United States Elsevier Science & Technology Books 2006Published in Cryptography for Developers (2006)Get full text
Book Chapter -
5
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms
ISBN: 142445879X, 9781424458790Published: IEEE 01.02.2010Published in 2010 International Conference on Availability, Reliability, and Security (01.02.2010)“…A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC) algorithm based on symmetric key…”
Get full text
Conference Proceeding -
6
Chapter 6 - Message—Authentication Code Algorithms
ISBN: 1597491047, 9781597491044Published: Syngress 2006Published in Cryptography for Developers (2006)“…Message Authentication Code (MAC) algorithms are a fairly crucial component of most online protocols. They ensure the authenticity of the message between two…”
Get full text
Book Chapter -
7
IMPLEMENTASI AUTHENTICATION & AUTHORIZATION BERBASIS JWT PADA SISTEM PENGELOLAAN PERKULIAHAN MENGGUNAKAN ALGORITMA HMAC
ISSN: 1907-6223, 2579-3497Published: 27.07.2025Published in Multitek Indonesia : jurnal ilmiah (27.07.2025)“…AbstrakKeamanan dan kerahasiaan data menjadi hal yang sangat penting karena data tersebut bisa digunakan oleh orang yang tidak bertanggung jawab untuk berbuat…”
Get full text
Journal Article -
8
3 B (Block Byte Bit) Cipher Algorithm for Secure Socket Layer
ISSN: 2770-8209Published: IEEE 23.05.2023Published in Proceedings (International Conference on Software Engineering Research, Management and Applications. Online) (23.05.2023)“…) algorithm to prevent from being eavesdropped, HMAC(Hash Message Authentication Code) algorithm to create digital signature using a shared secret key…”
Get full text
Conference Proceeding -
9
Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks
ISSN: 1948-3295Published: IEEE 06.04.2022Published in Proceedings / IEEE International Symposium on Quality Electronic Design (06.04.2022)“…In this paper, four different versions of FPGA-based hardware implementation for Chaskey-12, a lightweight message authentication code algorithm suitable for resource-constrained devices…”
Get full text
Conference Proceeding -
10
Secure SMS System for E-Commerce Applications
ISSN: 2231-508X, 2347-3789Published: 01.04.2014Published in International Journal of Science, Engineering and Computer Technology (01.04.2014)“… with exchanging key securely through unsecure channel. The proposed system provides the major security services which are Authenticity, Integrity and Confidentiality, by implementing Zero Knowledge Proof for authenticity, keyed message authentication…”
Get full text
Journal Article -
11
The Message Authentication Code Based on Universal Hashing
ISSN: 2074-7128, 2074-7136Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 01.06.2012Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.06.2012)“… The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article…”
Get full text
Journal Article -
12
Cyber security strategies based on HMAC in electric power remote monitoring and control system
ISSN: 1674-3415Published: 01.10.2011Published in Dianli Xitong Baohu yu Kongzhi (01.10.2011)“…In order to solve cyber security problems in electric power remote monitoring and control system, a scheme based on Hash message authentication code algorithm (HMAC) is introduced…”
Get full text
Journal Article -
13
Host’s source address verification based on stream authentication in the IPv6 access subnet
ISSN: 1000-436XPublished: Editorial Department of Journal on Communications 01.01.2013Published in Tongxin Xuebao (01.01.2013)“… source address verification for packet stream was achieved through message authentication code algorithm and stream…”
Get full text
Journal Article -
14
Host's source address verification based on stream authentication in the IPv6 access subnet
ISSN: 1000-436XPublished: Editorial Department of Journal on Communications 01.01.2013Published in Tongxin Xuebao (01.01.2013)“… The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm…”
Get full text
Journal Article -
15
基于流认证的 IPv6接入子网主机源地址验证
ISSN: 1000-436XPublished: 解放军信息工程大学 网络空间安全学院,河南 郑州 450004 2013Published in 通信学报 (2013)“…TP393.08; 提出了一种以密码学方法实现的 IPv6接入子网主机高速源地址验证方案.把主机 MAC 地址作为身份同主机公钥相绑定,利用密码生成地址算法从主机公钥衍生出 IPv6接入…”
Get full text
Journal Article -
16
블록 암호 알고리즘을 애용한 MAC 분석
ISSN: 1598-849X, 2383-9945Published: 2005Published in 韓國컴퓨터情報學會論文誌 (2005)“…This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message…”
Get full text
Journal Article -
17
블록 암호 알고리즘을 이용한 MAC 분석
ISSN: 1598-849X, 2383-9945Published: 한국컴퓨터정보학회 2005Published in 한국컴퓨터정보학회논문지 (2005)“…(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message…”
Get full text
Journal Article -
18
Information security with message authentication code
ISSN: 2312-8143, 2312-8151Published: Peoples’ Friendship University of Russia (RUDN University) 01.06.2012Published in Vestnik Rossiĭskogo universiteta druzhby narodov. Serii͡a︡ Inzhenernye issledovanii͡a (01.06.2012)“…This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties…”
Get full text
Journal Article -
19
On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques
ISBN: 9780769537863, 0769537863ISSN: 2161-2889Published: IEEE 01.09.2009Published in 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies (01.09.2009)“…Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC…”
Get full text
Conference Proceeding -
20
Energy efficient authentication strategies for network coding
ISSN: 1532-0626, 1532-0634Published: Chichester, UK John Wiley & Sons, Ltd 01.07.2012Published in Concurrency and computation (01.07.2012)“… We investigate different strategies based on message authentication codes algorithms (MACs) to thwart these attacks…”
Get full text
Journal Article

