Search

Your search keyword '"Message authentication code"' showing total 5,975 results

Search Constraints

Start Over You searched for: Descriptor "Message authentication code" Remove constraint Descriptor: "Message authentication code"
5,975 results on '"Message authentication code"'

Search Results

3. Security Analysis of CMAC in the Multi-user Model

4. Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality

5. Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing.

6. Guideline for implementing cryptography in the federal government

7. An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data.

8. When and How to Aggregate Message Authentication Codes on Lossy Channels?

9. BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks.

10. Guaranteeing the integrity and reliability of distributed personal information access records.

11. 智能车载网络中匿名认证与密钥交换协议.

12. Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs

13. A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments

14. Design of Mutual Authentication Method for Deep Learning Based Hybrid Cryptography to Secure data in Cloud Computing.

15. Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection

16. Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security

17. An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing

18. Localized Tamper Detection in Digital Images Using Three Phase Reversible Watermarking

19. Secure, Efficient, Lightweight Authentication in Wireless Sensor Networks

20. A Solution to Support Integrity in the Lawful Interception Ecosystem

21. Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes

22. Authenticated Encryption Schemes: A Systematic Review

23. Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces

24. Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

25. SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things.

27. Authentication, KDC, and Key Pre-distribution Techniques-Based Model for Securing AODV Routing Protocol in MANET

28. Protection of Information from Imitation on the Basis of Crypt-Code Structures

29. Implementation of Secure Sampled Value (SeSV) Messages in Substation Automation System.

31. MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

32. Ubiquitous Weak-Key Classes of BRW-Polynomial Function

33. Dynamic Multi-Keyword Search for Secure Data Storage in the Cloud using Cuckoo Filter.

34. Crypto-Aided MAP Test for Low-Latency Detection of False Data in Short Packets.

35. SDA-SM: An Efficient Secure Data Aggregation Scheme using Separate MAC across Wireless Sensor Networks.

36. Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers

37. Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems

38. AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY

40. Cryptography in RFID Systems

44. Quantum Authentication with Key Recycling

45. Quantum Authentication and Encryption with Key Recycling : Or: How to Re-use a One-Time Pad Even if — Safely & Feasibly

46. Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited

47. Codes for Detection of Limited View Algebraic Tampering

Catalog

Books, media, physical & digital resources