Sciweavers

119 search results - page 7 / 24
» Cryptanalysis of Message Authentication Codes
Sort
View
130
Voted
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 4 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann
154
Voted
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 6 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
15 years 4 months ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
90
Voted
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 4 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
ICIP
2006
IEEE
16 years 1 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu