Academic literature on the topic 'Message authentication code (MAC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Message authentication code (MAC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Message authentication code (MAC)"

1

Michail, H. E., G. Selimis, M. Galanis, D. Schinianakis, and C. E. Goutis. "Novel Hardware Implementation of the Cipher Message Authentication Code." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–6. http://dx.doi.org/10.1155/2008/923079.

Full text
Abstract:
A new algorithm for producing message authenticating codes (MACs) was recently proposed by NIST. The MAC protects both a message's integrity—by ensuring that a different MAC will be produced if the message has changed—as well as its authenticity because only someone who knows the secret key could have generated a valid MAC. The proposed security scheme incorporates an FIPS approved and secure block cipher algorithm and was standardized by NIST in May, 2005. In this paper is presented the first efficient hardware implementation of the CMAC standard.
APA, Harvard, Vancouver, ISO, and other styles
2

Mousavi, Seyyed Mehdi, and Dr Mohammad Hossein Shakour. "Increasing Cryptographic Security Using Message Authentication Code (MAC)." International Journal of Engineering and Technology 11, no. 4 (2019): 912–17. http://dx.doi.org/10.21817/ijet/2019/v11i4/191104073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Echandouri, Bouchra, Fouzia Omary, Fatima Ezzahra Ziani, and Anas Sadak. "SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm." International Journal of Information Security and Privacy 12, no. 3 (2018): 16–26. http://dx.doi.org/10.4018/ijisp.2018070102.

Full text
Abstract:
This article describes how the simplicity of data transmission made eavesdropping by malicious people easier. This became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was to fulfill authentication with a message authentication code (MAC) that was defined by the National Institute of Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than
APA, Harvard, Vancouver, ISO, and other styles
4

Ichwan, M., Milda Gustian, and Novan Rizky Nurjaman. "Implementasi Keyed-Hash Message Authentatication Code Pada Sistem Keamanan Rumah." MIND Journal 1, no. 1 (2018): 9. http://dx.doi.org/10.26760/mindjournal.v1i1.9.

Full text
Abstract:
Keyed-Hash Message Authentication Code (HMAC) adalah algoritma untuk menghitung nilai MAC (Message Authentication Code) yang menggunakan Fungsi Hash dikombinasikan dengan sebuah kunci rahasia, Fungsi Hash yang digunakan dalam penelitian ini adalah Secure Ha sh Algorithm 256 (SHA256). Nilai MAC digunakan sebagai otentikasi untuk menjamin integritas data dan keaslian pesan. Algoritma ini di implementasikan pada sistem keamanan rumah, dimana pertukaran pesan antara user dan sistem keamanan di otentikasi dengan menggunakan HMAC. Keamanan algoritma HMAC ini dibuktikan dengan hasil pengujian Avalanc
APA, Harvard, Vancouver, ISO, and other styles
5

Abdulla, Abdulla, and Yaseen Ismaeel. "Applying Message Authentication Code (MAC) in text chatting system." TANMIYAT AL-RAFIDAIN 30, no. 92 (2008): 9–18. http://dx.doi.org/10.33899/tanra.2008.161723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Noh, Jaewon, Sangil Jeon, and Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles." Electronics 9, no. 1 (2020): 74. http://dx.doi.org/10.3390/electronics9010074.

Full text
Abstract:
Vehicular ad-hoc networks (VANETs) have several security issues such as privacy preservation, secure authentication, and system reliability. In the VANET, a vehicle communicates with other vehicles or infrastructures using broadcasting messages. These messages contain not only normal traffic information, but also identification information of sender. In general, the identification information remains encrypted to ensure privacy. However, the conventional centralized system can decrypt the identification information using private information of the sender vehicle. As a result, the central serve
APA, Harvard, Vancouver, ISO, and other styles
7

Hussain, S. M. Suhail, Shaik Mullapathi Farooq, and Taha Selim Ustun. "Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security." IEEE Access 7 (2019): 80980–84. http://dx.doi.org/10.1109/access.2019.2923728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zivic, Natasa. "Principles of Soft Verification." International Journal of Distributed Systems and Technologies 4, no. 1 (2013): 1–15. http://dx.doi.org/10.4018/jdst.2013010101.

Full text
Abstract:
This paper considers messages protected with the Message Authentication Code (MAC) for the sake of authenticity. The standard forward error correcting channel code is assumed, which reduces the error rate, but no repeat mechanism exists to correct the remaining errors. The uncorrected errors cause the rejection of messages with a wrong MAC, as a successful MAC verification (“hard” verification) demands errorless message and errorless MAC. This paper introduces the extension of “hard” verification of MACs, whose result is “true” or “false”, to “soft” verification, that outputs additionally a tr
APA, Harvard, Vancouver, ISO, and other styles
9

Muraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.

Full text
Abstract:
Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does no
APA, Harvard, Vancouver, ISO, and other styles
10

Jabiullah, Md Ismail, AA Md Monzur Ul Akhir, and Muhammed Rasheduzzaman. "A Double-Key Based Encryption-Decryption Process for Stronger Secured Message Transactions." GUB Journal of Science and Engineering 6, no. 1 (2020): 75–80. http://dx.doi.org/10.3329/gubjse.v6i1.52053.

Full text
Abstract:
A double-key based stronger secured electronic message transaction system has been designed and developed using Python programming language by performing encryption-decryption process. To do this, simple cryptographic encryption and decryption techniques are used with two keys avoiding vulnerabilities of a single key. First, the intended message is encrypted with the private key of sender (PRa) and the output is again encrypted with a shared secret key (K1) that generates ciphertext. The output ciphertext is again encrypted with another shared secret key (K2) that generates a code that serves
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Message authentication code (MAC)"

1

Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/24343.

Full text
Abstract:
The concept of wireless sensor network (WSN) is where tiny devices (sensor nodes), positioned fairly close to each other, are used for sensing and gathering data from its environment and exchange information through wireless connections between these nodes (e.g. sensor nodes distributed through out a bridge for monitoring the mechanical stress level of the bridge continuously). In order to easily deploy a relatively large quantity of sensor nodes, the sensor nodes are typically designed for low price and small size, thereby causing them to have very limited resources available (e.g. energy, pr
APA, Harvard, Vancouver, ISO, and other styles
2

NEIMAN, ADAM M. "HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1130852252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tomaz, Antonio Emerson Barros. "Resgate de autoria em esquemas de assinatura em anel." reponame:Repositório Institucional da UFC, 2014. http://www.repositorio.ufc.br/handle/riufc/10842.

Full text
Abstract:
TOMAZ. A. E. B. Resgate de autoria em esquemas de assinatura em anel. 2014. 67 f. Dissertação (Mestrado em Engenharia de Teleinformática) - Centro de Tecnologia, Universidade Federal do Ceará, Fortaleza, 2014.<br>Submitted by Marlene Sousa (mmarlene@ufc.br) on 2015-02-27T18:29:04Z No. of bitstreams: 1 2014_dis_aebtomaz.pdf: 1072067 bytes, checksum: 405260d86425363feaec1802b2775de1 (MD5)<br>Approved for entry into archive by Marlene Sousa(mmarlene@ufc.br) on 2015-03-04T16:09:55Z (GMT) No. of bitstreams: 1 2014_dis_aebtomaz.pdf: 1072067 bytes, checksum: 405260d86425363feaec1802b2775de1 (MD5)<br>
APA, Harvard, Vancouver, ISO, and other styles
4

Wainewright, Evelyn. "Efficient Simulation for Quantum Message Authentication." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35213.

Full text
Abstract:
A mix of physics, mathematics, and computer science, the study of quantum information seeks to understand and utilize the information that can be held in the state of a quantum system. Quantum cryptography is then the study of various cryptographic protocols on the information in a quantum system. One of the goals we may have is to verify the integrity of quantum data, a process called quantum message authentication. In this thesis, we consider two quantum message authentication schemes, the Clifford code and the trap code. While both of these codes have been previously proven secure, they hav
APA, Harvard, Vancouver, ISO, and other styles
5

Junior, Marcos Antonio Simplício. "Algoritmos de autenticação de mensagens para redes de sensores." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11082010-114456/.

Full text
Abstract:
Prover segurança às informações trafegadas nos mais diversos tipos de redes é algo essencial. Entretanto, redes altamente dependentes de dispositivos com recursos limitados (como sensores, tokens e smart cards) apresentam um desafio importante: a reduzida disponibilidade de memória e energia destes dispositivos, bem como sua baixa capacidade de processamento, dificultam a utilização de diversos algoritmos criptográficos considerados seguros atualmente. Este é o caso não apenas de cifras simétricas, que proveem confidencialidade aos dados, mas também de MACs (Message Authentication Code, ou Cód
APA, Harvard, Vancouver, ISO, and other styles
6

Oliveira, Bruno Trevizan de. "Arquitetura de segurança fim-a-fim para redes de sensores sem fio." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-21062013-120411/.

Full text
Abstract:
Diversas aplicações de redes de sensores sem fio necessitam de serviços de segurança, como confidencialidade, integridade e autenticação de origem de dados. Contudo, dadas as limitações de processamento, memória e suprimento de energia dos dispositivos, os mecanismos de segurança tradicionais podem causar efeitos indesejáveis na rede, como atraso na comunicação e aumento no consumo de energia, impondo obstáculos para seu uso na tecnologia em questão. Muitas propostas de esquemas de segurança baseados em criptografia simétrica projetados especificamente para redes de sensores sem fio são encont
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Ming-hua, and 李明樺. "Construct Message Authentication Code with." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/43242182443745386123.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程系<br>89<br>In this thesis, we suggest a new method to construct Message Authentication Code with SHA-1 and AES(Rijndael), with key of 128, 192, 256 bits. In the process of MAC construction, we add a random number to prevent the problem of leaking the intermediate hash value. The security of the whole scheme is based on the block cipher, AES. That is even if the adopted hash function is not collision free or one-way, the scheme is still secure. This method provides an efficient software implementation to process long messages and has clear security properties.
APA, Harvard, Vancouver, ISO, and other styles
8

Lo, Yung-Lin, and 羅永霖. "Image Hiding with Message Authentication Code." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/99800662485507952037.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>92<br>Steganographic methods hide the critical information in cover carriers so that it cannot be seen while it is transmitted on public communication channels. To strength the security, the secret information is recommended to encrypt before the embedding process. However, there has been growing interest in techniques that avoid encryption, because encryption software is quite slow, and encryption hardware costs are not negligible. Besides, encryption algorithms may be cover by patents, and subject to some countries export control. Thus, the major goal of this paper is
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Yin-Zhen, and 梁尹蓁. "Hardware Design of Constructing Message Authentication Code." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/97211273500370404576.

Full text
Abstract:
碩士<br>立德管理學院<br>應用資訊研究所<br>91<br>We construct a Message Authentication Code (MAC), which combines Rijndael’s Advanced Encryption Standard (AES) 128-bit and Secure Hash Algorithm (SHA-1) and implement it on the Altera Field Programmable Gate Array (FPGA) chip. The AES algorithm uses the math of finite-field. We have a set of math module including multiplication and inverse operations, which can reduce the complexity of AES module. Implementation of our architecture need 17153 logic cell elements on a FPGA chip and achieves 12.4 MHz in frequency. Moreover, our proposed design does not need memor
APA, Harvard, Vancouver, ISO, and other styles
10

Carvalho, Nuno Tiago Ferreira de. "A practical validation of Homomorphic Message Authentication schemes." Master's thesis, 2014. http://hdl.handle.net/1822/37266.

Full text
Abstract:
Dissertação de mestrado em Engenharia Informática<br>Currently, cloud computing is very appealing because it allows the user to outsource his data so it can later be accessed from multiple devices. The user can also delegate to the cloud computing service provider some, possibly complex, operations on the outsourced data. Since this service provider may not always be trusted, it is necessary to not only preserve the privacy but also to enforce the authenticity of the outsourced data. Lately, a lot of work was put on solving the first problem, specially after the introduction of the first
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Message authentication code (MAC)"

1

Technology), Information Technology Laboratory (National Institute of Standards and. The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Information Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Information Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Information Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Information Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Information Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

E, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.

Full text
Abstract:
This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and H
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Message authentication code (MAC)"

1

Pelzl, Jan, and Christof Paar. "Message Authentication Codes (MACs)." In Kryptografie verständlich. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paar, Christof, and Jan Pelzl. "Message Authentication Codes (MACs)." In Understanding Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "message authentication code." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_11364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bernstein, Daniel J. "The Poly1305-AES Message-Authentication Code." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bakhtiari, S., R. Safavi-Naini, and J. Pieprzyk. "A message authentication code based on latin squares." In Information Security and Privacy. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lu, Jiqiang, Zhigang Zhao, and Huaqun Guo. "White-Box Implementation of the KMAC Message Authentication Code." In Information Security Practice and Experience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cary, Matthew, and Ramarathnam Venkatesan. "A Message Authentication Code Based on Unimodular Matrix Groups." In Advances in Cryptology - CRYPTO 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45146-4_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Feng, Cheng Zhong, and Danhua Lu. "Cross Message Authentication Code Based on Multi-core Computing Technology." In Advances in Intelligent and Soft Computing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29387-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alosaimy, Raed, Khaled Alghathbar, Alaaeldin M. Hafez, and Mohamed H. Eldefrawy. "NMACA Approach Used to Build a Secure Message Authentication Code." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17610-4_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blackburn, Simon R., and Kenneth G. Paterson. "Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan." In Fast Software Encryption. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25937-4_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Message authentication code (MAC)"

1

Echandouri, Bouchra, Charifa Hanin, Fouzia Omary, and Souad Elbernoussi. "LCAHASH-MAC: A new lightweight message authentication code using cellular automata for RFID." In 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, 2017. http://dx.doi.org/10.1109/wincom.2017.8238158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lan, Jingjing, Jun Zhou, and Xin Liu. "An area-efficient implementation of a Message Authentication Code (MAC) algorithm for cryptographic systems." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sihite, Alfonso Brolin, and Muhammad Salman. "E-Voting and e-Recap Verification and Validation Schemes for Indonesia Utilizing Cryptographic Hash Function Message Authentication Codes (MAC) and Public Key Infrastructure (PKI)." In 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2019. http://dx.doi.org/10.1109/icimcis48181.2019.8985212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goll, Martin, and Shay Gueron. "Vectorization of Poly1305 Message Authentication Code." In 2015 12th International Conference on Information Technology - New Generations (ITNG). IEEE, 2015. http://dx.doi.org/10.1109/itng.2015.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Van, Dang Hai, and Nguyen Dinh Thuc. "A Privacy Preserving Message Authentication Code." In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jun He and Hai-feng Qian. "Forward-secure aggregate message authentication code." In IET International Communication Conference on Wireless Mobile & Computing (CCWMC 2009). IET, 2009. http://dx.doi.org/10.1049/cp.2009.2044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Dajiang, Shaoquan Jiang, and Zhiguang Qin. "Message Authentication Code over a wiretap channel." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Michail, H. E., A. P. Kakarountas, G. Selimis, and C. E. Goutis. "Throughput Optimization of the Cipher Message Authentication Code." In 2007 15th International Conference on Digital Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icdsp.2007.4288627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rashwan, A. M., A.-E. M. Taha, and H. S. Hassanein. "Benchmarking message authentication code functions for mobile computing." In GLOBECOM 2012 - 2012 IEEE Global Communications Conference. IEEE, 2012. http://dx.doi.org/10.1109/glocom.2012.6503506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ullah, Ikram, Nirvana Meratnia, and Paul J. M. Havinga. "iMAC: Implicit Message Authentication Code for IoT Devices." In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, 2020. http://dx.doi.org/10.1109/wf-iot48130.2020.9221331.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Message authentication code (MAC)"

1

Smid, Miles E., Elaine Barker, David Balenson, and Martha Haykin. Message authentication code (MAC) validation system. National Bureau of Standards, 1988. http://dx.doi.org/10.6028/nbs.sp.500-156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gutmann, P. Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ovsienko, D. Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krovetz, T., ed. UMAC: Message Authentication Code using Universal Hashing. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malhotra, A., and S. Goldberg. Message Authentication Code for the Network Time Protocol. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sorce, S., and T. Yu. Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eastlake, D. HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McGrew, D., and J. Viega. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schaad, J., and R. Housley. Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!