Showing 1 - 2 results of 2 for search '"message authentication code"', query time: 0.07s Refine Results
  1. 1

    Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography by Shimaa A. Abdel Hakeem, Mohamed A. Abd El-Gawad, HyungWon Kim

    Published 2020-10-01
    “…The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. …”
    Get full text
    Article
  2. 2

    Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication by Shimaa A. Abdel Hakeem, HyungWon Kim

    Published 2022-01-01
    “…This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key authentication using Hashed Message Authentication Code Protocol (HMAC). The proposed protocol allows the group manager to generate a master secret key for a group of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi></mrow></semantics></math></inline-formula> vehicles and split this key into secret shares; each share is distributed securely to every group member. …”
    Get full text
    Article