Showing 1 - 20 results of 105 for search '"message authentication code"', query time: 0.17s Refine Results
  1. 1

    Information security with message authentication code by T A Bilyk, A A Vnukov

    Published 2012-06-01
    “…This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on. …”
    Get full text
    Article
  2. 2

    The Message Authentication Code Based on Universal Hashing by T. A. Bilyk, A. U. Nesterenko

    Published 2012-06-01
    Subjects: “…message authentication code…”
    Get full text
    Article
  3. 3

    A TWOOA construction for multi-receiver multi-message authentication codes by Fuji-Hara Ryoh, Li Xiyang, Miao Ying, Wu Dianhua

    Published 2008-04-01
    “…Obana and Kurosawa [Designs, Codes and Cryptography, 22 (2001), pp. 47–63] used a special pair of orthogonal arrays, called TWOOA, to construct a (k, n; 2) multi-receiver single-message authentication code. In this paper, we generalize the notion of a TWOOA, and then use this generalized TWOOA to construct a (k, n; w) multi-receiver multi-message authentication code, which exceeds that of Safavi-Naini and Wang [Proc. of Eurocrypt'98, LNCS 1403, Springer (1998), pp. 527–541] at least in the numbers of receivers and authenticated messages. …”
    Get full text
    Article
  4. 4
  5. 5

    Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes by Filip Katulic, Damir Sumina, Stjepan Gros, Igor Erceg

    Published 2023-01-01
    “…This paper presents a novel method for enhancing the cybersecurity of Modbus/TCP-based IACSs by implementing an authentication method based on message authentication codes (MACs). To provide partial protection of communication even when communicating with legacy Modbus/TCP peers, we propose a novel supervising device that analyzes exchanged messages and verifies the authenticity of the protected messages. …”
    Get full text
    Article
  6. 6

    Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks by Sooyeon Shin, Minwoo Kim, Taekyoung Kwon

    Published 2017-11-01
    “…We evaluate and compare performance of selected block ciphers and message authentication codes to recommend better solutions for wireless sensor networks. …”
    Get full text
    Article
  7. 7
  8. 8

    PENERAPAN MODIFIKASI LACK STEGANOGRAPHY DAN LAYANAN MESSAGE AUTHENTICATION CODE PADA KOMUNIKASI MULTIMEDIA by , Huzain Azis, , Drs. Retantyo Wardoyo, M.Sc, Ph.D.

    Published 2013
    “…This study build a modification of LACK steganography system that utilized multimedia communication as a medium in addition Message Authentication Code service. End of the study the system will go through the process of functionality and performance testing. the result showed that the modification of LACK on payload field of Theora codec has a large capacity of hiding places and flexible, Using MD5 includes simetric key provide authentication and integrity service for steganogram.…”
    Thesis
  9. 9

    Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine by Mat Isa, Mohd Anuar, Ahmad, Miza Mumtaz, Mohd Sani, Nor Fazlida, Hashim, Habibah, Mahmod, Ramlan

    Published 2014
    “…In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. …”
    Get full text
    Article
  10. 10

    Another look at HMAC by Koblitz Neal, Menezes Alfred

    Published 2013-10-01
    Subjects: “…message authentication code…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20