Skip to main content
The recently introduced Galois/Counter Mode (GCM) of op- eration for block ciphers provides both encryption and message authenti- cation, using universal hashing based on multiplication in a binary finite field. We analyze its security... more
    • by 
    •   7  
      Hardware DesignStandard ModelIT SecuritySystem Security
... Doraisanipalya, Bannerghatta Road Bangalore 560076, India Email: {suman.roy, debapriyay.mukhopadhyay, chandrashekhara.thejaswi} ghoneywell.com ... Network Design, Probabilistic Au-tomaton, Random Key Pre-distribution, Message... more
    • by 
    •   14  
      Computer ScienceNetwork SecurityData CompressionWireless Network
    • by 
    •   16  
      FinanceCoding TheoryModelingBiometrics
    • by  and +1
    •   5  
      Digital SignatureSecurity AnalysisVehicular ad hoc networkKey Distribution
    • by 
    •   16  
      Computer ScienceComputer NetworksCryptographyWireless networks
For objects stored in long-term digital archives, checking the integrity of the information stored is a prime necessity in the field of secure storage systems. Objects in a digital archive may include documents, images, databases, ...,... more
    • by 
    •   5  
      Computer ScienceInformation SecurityCryptographyMD
In the present paper, a new protocol for authentication and key distribution is proposed. The new protocol has the aim to achieve a comparable performance with the Kerberos protocol and overcome its drawbacks. For authentication of the... more
    • by 
    •   5  
      CMSClock synchronizationDiffie-Hellman-DSAKey Distribution
    • by 
    •   6  
      Distributed ComputingComputer SystemBlock CipherMESSAGE AUTHENTICATION CODE(MAC)
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every... more
    • by 
    •   13  
      Computer ScienceFPGAComputer HardwareHash Functions
N. Meghanathan et al. (Eds.): CNSA 2010, CCIS 89, pp. 105–113, 2010. © Springer-Verlag Berlin Heidelberg 2010 ... VLSI Design and Implementation of Combined Secure ... R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J.... more
    • by 
    •   12  
      Computer ScienceVlsi DesignInformation SecurityDigital Signature
    • by 
    •   9  
      EngineeringComputer ScienceModulationData Hiding
    • by 
    •   12  
      Computer SecurityPure MathematicsCryptologyAES
    • by 
    •   16  
      Wireless Sensor NetworksComputer SecurityCryptographyAuthentication
    • by 
    •   2  
      MESSAGE AUTHENTICATION CODE(MAC)Message Authentication Code
    • by 
    •   10  
      Information SystemsDigital LibraryLibrary and Information StudiesLegislation
Cryptographic hash functions had been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and most important of them is their use in the composition of efficient Message... more
    • by 
    •   9  
      CryptographyCryptanalysisSecure Hash AlgorithmRandom Number Generation
    • by 
    •   11  
      Digital SignatureWatermarkingCryptographyData Privacy
Data integrity assurance and data origin authentication are essential security services in financial transactions, electronic commerce, electronic mail, software distribution, data storage and so on. The broadest definition of... more
    • by 
    •   20  
      Information SecurityCryptographyInternet Routing ProtocolVirtual Private Network
    • by 
    •   13  
      EngineeringGovernmentData CompressionCryptography
    • by 
    •   9  
      Computer ScienceSoftware EngineeringRoutingProtocols
    • by 
    •   10  
      NetworksCryptographyOPERATING SYSTEMFormal Verification
    • by 
    •   11  
      Distributed ComputingStatic AnalysisComputer SoftwareFormal Specification
    • by 
    •   5  
      Computational ComplexityComparative AnalysisData EncryptionWireless Data
    • by 
    •   12  
      Wireless Sensor NetworksSecurity RequirementsPatient MonitoringAccelerometers
    • by 
    •   4  
      CryptoCryptologyUpper BoundMessage Authentication Code
... Beirut, Lebanon {wgi01, csg04, ame34, ayman, chehab}@aub.edu.lb Abstract-We present SinPack, a security protocol for preventing packet pollution attacks in network-coded content distribution networks. SinPack employs a... more
    • by 
    •   17  
      Computer ScienceDigital SignatureNetwork codingData Structure
    • by 
    •   7  
      Social PsychologyDigital SignatureConfidenceComputer Security
    • by 
    •   11  
      Computer ScienceDistributed ComputingUbiquitous ComputingWireless Network
    • by 
    •   14  
      RoutingPacket SwitchingDistributed SystemSafety
    • by 
    •   14  
      RoutingPacket SwitchingDistributed SystemSafety
Message Authentication Codes (MACs) are very sensitive to any modification in the message. The verification fails even if there is a slight change in the message. However, special algorithms have been introduced that tolerate a small... more
    • by 
    •   6  
      Multimedia CommunicationError CorrectionBlock CodesMESSAGE AUTHENTICATION CODE(MAC)
The paper discusses the compatibility of WiMax and Wi-Fi networks. These networks are most popular in industry now days. WiMax is used for MAN and Wi-Fi is used for LAN. WiMax standard provides point to multipoint broadband services up to... more
    • by 
    •   9  
      CryptographyWimaxBroadband Wireless AccessComparative Analysis
    • by 
    •   7  
      Computer ScienceProvable SecurityQuery processingBlock Cipher
    • by 
    •   7  
      Computer ScienceProvable SecurityQuery processingBlock Cipher
    • by 
    •   3  
      Computer ScienceRFCMessage Authentication Code
    • by 
    •   11  
      Law EnforcementWireless Mobile ChargerAd Hoc NetworksProtocols
    • by 
    •   10  
      Digital SignatureAuthenticationData StructureNetwork Traffic
    • by 
    •   7  
      EncryptionAuthenticationProvable SecurityParallelization
    • by 
    • Message Authentication Code
    • by 
    •   8  
      Pure MathematicsProvable SecurityCryptologyRandom permutation generation
    • by 
    •   11  
      Digital SignatureWatermarkingCryptographyData Privacy
    • by 
    •   2  
      Digital SignatureMessage Authentication Code
Summary IEEE 802.11i security standard is emerging as an essential security requirement to support the growth of a wide range of wireless data services and applications. However, with the advent of more battery powered wireless devices,... more
    • by 
    •   5  
      Computational ComplexityComparative AnalysisData EncryptionWireless Data
    • by 
    •   7  
      Wireless Sensor NetworksAd Hoc NetworksProtocolsWireless Sensor Network