-
1
Information security with message authentication code
Published 2012-06-01“…This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on. …”
Get full text
Article -
2
The Message Authentication Code Based on Universal Hashing
Published 2012-06-01Subjects: “…message authentication code…”
Get full text
Article -
3
A TWOOA construction for multi-receiver multi-message authentication codes
Published 2008-04-01“…Obana and Kurosawa [Designs, Codes and Cryptography, 22 (2001), pp. 47–63] used a special pair of orthogonal arrays, called TWOOA, to construct a (k, n; 2) multi-receiver single-message authentication code. In this paper, we generalize the notion of a TWOOA, and then use this generalized TWOOA to construct a (k, n; w) multi-receiver multi-message authentication code, which exceeds that of Safavi-Naini and Wang [Proc. of Eurocrypt'98, LNCS 1403, Springer (1998), pp. 527–541] at least in the numbers of receivers and authenticated messages. …”
Get full text
Article -
4
Effective Implementations of Data Encryption and Generation of Message Authentication Code in Block-Oriented Devices
Published 2014-12-01Subjects: Get full text
Article -
5
Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes
Published 2023-01-01“…This paper presents a novel method for enhancing the cybersecurity of Modbus/TCP-based IACSs by implementing an authentication method based on message authentication codes (MACs). To provide partial protection of communication even when communicating with legacy Modbus/TCP peers, we propose a novel supervising device that analyzes exchanged messages and verifies the authenticity of the protected messages. …”
Get full text
Article -
6
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks
Published 2017-11-01“…We evaluate and compare performance of selected block ciphers and message authentication codes to recommend better solutions for wireless sensor networks. …”
Get full text
Article -
7
Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks
Published 2015-07-01Get full text
Article -
8
PENERAPAN MODIFIKASI LACK STEGANOGRAPHY DAN LAYANAN MESSAGE AUTHENTICATION CODE PADA KOMUNIKASI MULTIMEDIA
Published 2013“…This study build a modification of LACK steganography system that utilized multimedia communication as a medium in addition Message Authentication Code service. End of the study the system will go through the process of functionality and performance testing. the result showed that the modification of LACK on payload field of Theora codec has a large capacity of hiding places and flexible, Using MD5 includes simetric key provide authentication and integrity service for steganogram.…”
Thesis -
9
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
Published 2014“…In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. …”
Get full text
Article -
10
Another look at HMAC
Published 2013-10-01Subjects: “…message authentication code…”
Get full text
Article -
11
-
12
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers
Published 2020-12-01Subjects: Get full text
Article -
13
SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation
Published 2024-03-01Subjects: Get full text
Article -
14
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
Published 2022-01-01Subjects: Get full text
Article -
15
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
Published 2023-01-01Subjects: Get full text
Article -
16
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
Published 2015-07-01Subjects: Get full text
Article -
17
-
18
EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid
Published 2017-08-01Subjects: Get full text
Article -
19
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
Published 2024-03-01Subjects: Get full text
Article -
20
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Published 2017-03-01Subjects: Get full text
Article