Message Authentication Code
1 Follower
Recent papers in Message Authentication Code
The recently introduced Galois/Counter Mode (GCM) of op- eration for block ciphers provides both encryption and message authenti- cation, using universal hashing based on multiplication in a binary finite field. We analyze its security... more
... Doraisanipalya, Bannerghatta Road Bangalore 560076, India Email: {suman.roy, debapriyay.mukhopadhyay, chandrashekhara.thejaswi} ghoneywell.com ... Network Design, Probabilistic Au-tomaton, Random Key Pre-distribution, Message... more
For objects stored in long-term digital archives, checking the integrity of the information stored is a prime necessity in the field of secure storage systems. Objects in a digital archive may include documents, images, databases, ...,... more
In the present paper, a new protocol for authentication and key distribution is proposed. The new protocol has the aim to achieve a comparable performance with the Kerberos protocol and overcome its drawbacks. For authentication of the... more
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every... more
N. Meghanathan et al. (Eds.): CNSA 2010, CCIS 89, pp. 105113, 2010. © Springer-Verlag Berlin Heidelberg 2010 ... VLSI Design and Implementation of Combined Secure ... R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J.... more
Cryptographic hash functions had been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and most important of them is their use in the composition of efficient Message... more
Data integrity assurance and data origin authentication are essential security services in financial transactions, electronic commerce, electronic mail, software distribution, data storage and so on. The broadest definition of... more
... Beirut, Lebanon {wgi01, csg04, ame34, ayman, chehab}@aub.edu.lb Abstract-We present SinPack, a security protocol for preventing packet pollution attacks in network-coded content distribution networks. SinPack employs a... more
Message Authentication Codes (MACs) are very sensitive to any modification in the message. The verification fails even if there is a slight change in the message. However, special algorithms have been introduced that tolerate a small... more
The paper discusses the compatibility of WiMax and Wi-Fi networks. These networks are most popular in industry now days. WiMax is used for MAN and Wi-Fi is used for LAN. WiMax standard provides point to multipoint broadband services up to... more
Summary IEEE 802.11i security standard is emerging as an essential security requirement to support the growth of a wide range of wireless data services and applications. However, with the advent of more battery powered wireless devices,... more