Search Results - Message authentication code algorithm

Refine Results
  1. 1

    Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security by Hussain, S. M. Suhail, Farooq, Shaik Mullapathi, Ustun, Taha Selim

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “…) algorithms, such as Hash-based Message Authentication Code (HMAC) and Advanced Encryption Standard-Galois Message Authentication Code (AES-GMAC…”
    Get full text
    Journal Article
  2. 2

    The price of security in wireless sensor networks by Lee, Jongdeog, Kapitanova, Krasimira, Son, Sang H.

    ISSN: 1389-1286, 1872-7069
    Published: Kidlington Elsevier B.V 03.12.2010
    “…: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms…”
    Get full text
    Journal Article
  3. 3

    DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm by Noura, Hassan N., Couturier, Raphaël, Salman, Ola, Mazouzi, Kamel

    ISSN: 0920-8542, 1573-0484
    Published: New York Springer US 01.08.2022
    Published in The Journal of supercomputing (01.08.2022)
    “… Existing cryptographic algorithms, especially the Message Authentication Algorithms (MAAs) such as Hash Message Authentication Code…”
    Get full text
    Journal Article
  4. 4

    SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm by Echandouri, Bouchra, Omary, Fouzia, Ziani, Fatima Ezzahra, Sadak, Anas

    ISSN: 1930-1650, 1930-1669
    Published: Hershey IGI Global 01.07.2018
    “… In this article, the authors propose a new cipher-based message authentication code (CMAC) algorithm. Their proposed…”
    Get full text
    Journal Article
  5. 5

    Research and Implementation of Secure Upgrade Method for Embedded Control Software by CHEN Junbo, ZOU Junyang, ZHANG Tianyu

    ISSN: 2096-5427
    Published: Editorial Office of Control and Information Technology 01.12.2024
    Published in Kongzhi Yu Xinxi Jishu (01.12.2024)
    “… software upgrade methodology and process. A software signature and check method based on the hash-based message authentication code (HMAC…”
    Get full text
    Journal Article
  6. 6

    Implementation of message authentication code using DNA-LCG key and a novel hash algorithm by Sodhi, Gurpreet Kour, Gaba, Gurjot Singh, Kansal, Lavish, Bakkali, Mohamed El, Tubbal, Faisel Em

    ISSN: 2088-8708, 2088-8708
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2019
    “… The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity…”
    Get full text
    Journal Article
  7. 7

    SDRP: secure and dynamic routing protocol for mobile ad-hoc networks by Ghosh, Uttam, Datta, Raja

    ISSN: 2047-4954, 2047-4962, 2047-4962
    Published: Stevenage The Institution of Engineering and Technology 01.09.2014
    Published in IET networks (01.09.2014)
    “… It makes use of signature and ‘Message Authentication Codealgorithms to provide end-to-end, hop-to-hop and whole-route authentications…”
    Get full text
    Journal Article
  8. 8

    A novel secured authentication model for LTE network system using BD-POA-HECC, HD-MAC, and PD-3WHP techniques by Sagar, Dasari, Saidireddy, Malgireddy

    ISSN: 0957-4174
    Published: Elsevier Ltd 15.12.2024
    Published in Expert systems with applications (15.12.2024)
    “…) user network is utilized by the largest population because of its adaptability with highly developed authentication and encryption models…”
    Get full text
    Journal Article
  9. 9

    An area-efficient implementation of a Message Authentication Code (MAC) algorithm for cryptographic systems by Jingjing Lan, Jun Zhou, Xin Liu

    ISSN: 2159-3450
    Published: IEEE 01.11.2016
    Published in TENCON ... IEEE Region Ten Conference (01.11.2016)
    “…In this paper, an area-efficient hardware implementation of the lightweight Chaskey algorithm is present…”
    Get full text
    Conference Proceeding
  10. 10

    Secure and Robust Two-Phase Image Authentication by Tabatabaei, Seyed Amir Hossein, Ur-Rehman, Obaid, Zivic, Natasa, Ruland, Christoph

    ISSN: 1520-9210, 1941-0077
    Published: Piscataway IEEE 01.07.2015
    Published in IEEE transactions on multimedia (01.07.2015)
    “…). The AMACs combine error- correcting codes with cryptographic primitives such as message authentication codes and symmetric encryption algorithms…”
    Get full text
    Journal Article
  11. 11

    Correlation power attack on a message authentication code based on SM3 by Yuan, Ye, Qu, Kai-ge, Wu, Li-ji, Ma, Jia-wei, Zhang, Xiang-min

    ISSN: 2095-9184, 2095-9230
    Published: Hangzhou Zhejiang University Press 01.07.2019
    “…Hash-based message authentication code (HMAC) is widely used in authentication and message integrity…”
    Get full text
    Journal Article
  12. 12

    Design and implementation of multiple authentication schemes on navigation messages by Chunpeng, Liu, Wenhao, Dong, Ma, Maode, Shuang, Xiao

    ISSN: 1673-5447
    Published: China Institute of Communications 01.09.2025
    Published in China communications (01.09.2025)
    “…) spoofing attacks on UAVs, resulting in major security risks for UAVs. In order to cope with spoofing attacks, a navigation message authentication (NMA…”
    Get full text
    Journal Article
  13. 13

    Enhancing the Security of MANETs using Hash Algorithms by Ravilla, Dilli, Putta, Chandra Shekar Reddy

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2015
    Published in Procedia computer science (2015)
    “… This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm…”
    Get full text
    Journal Article
  14. 14

    Message-Authentication Code Algorithms by St Denis, Tom

    ISBN: 1597491047, 9781597491044
    Published: United States Elsevier Science & Technology Books 2006
    Published in Cryptography for Developers (2006)
    Get full text
    Book Chapter
  15. 15
  16. 16

    Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms by Adekunle, A.A., Woodhead, S.R.

    ISBN: 142445879X, 9781424458790
    Published: IEEE 01.02.2010
    “…A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC…”
    Get full text
    Conference Proceeding
  17. 17

    Securing IEEE 1588 messages with message authentication codes based on the KECCAK cryptographic algorithm implemented in FPGAs by Moreira, Naiara, Astarloa, Armando, Kretzschmar, Uli, Lazaro, Jesus, Molina, Elias

    ISSN: 2163-5137
    Published: IEEE 01.06.2014
    “… But security is only defined as an optional extension and presents several vulnerabilities. In particular, the cryptographic algorithms specified in the standard…”
    Get full text
    Conference Proceeding
  18. 18

    Routing Using Trust Based System with SHA-2 Authentication by Ravilla, Dilli, Putta, Chandra Shekar Reddy

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2015
    Published in Procedia computer science (2015)
    “…), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and a hashing algorithm, keyed-Hash Message Authentication Code…”
    Get full text
    Journal Article
  19. 19

    The Parallel CMAC Authentication Algorithm by Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Liu, Jianwei, Xu, Tongge

    ISSN: 2472-8489
    Published: IEEE 01.06.2019
    “… The authentication algorithm provides services for user validation or authentication. The Message Authentication Code (MAC…”
    Get full text
    Conference Proceeding
  20. 20

    Chapter 6 - MessageAuthentication Code Algorithms by Tom St Denis, Simon Johnson

    ISBN: 1597491047, 9781597491044
    Published: Syngress 2006
    Published in Cryptography for Developers (2006)
    “…Message Authentication Code (MAC) algorithms are a fairly crucial component of most online protocols…”
    Get full text
    Book Chapter