Academic literature on the topic 'Message authentication code (MAC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Message authentication code (MAC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Message authentication code (MAC)"
Michail, H. E., G. Selimis, M. Galanis, D. Schinianakis, and C. E. Goutis. "Novel Hardware Implementation of the Cipher Message Authentication Code." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–6. http://dx.doi.org/10.1155/2008/923079.
Full textMousavi, Seyyed Mehdi, and Dr Mohammad Hossein Shakour. "Increasing Cryptographic Security Using Message Authentication Code (MAC)." International Journal of Engineering and Technology 11, no. 4 (2019): 912–17. http://dx.doi.org/10.21817/ijet/2019/v11i4/191104073.
Full textEchandouri, Bouchra, Fouzia Omary, Fatima Ezzahra Ziani, and Anas Sadak. "SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm." International Journal of Information Security and Privacy 12, no. 3 (2018): 16–26. http://dx.doi.org/10.4018/ijisp.2018070102.
Full textIchwan, M., Milda Gustian, and Novan Rizky Nurjaman. "Implementasi Keyed-Hash Message Authentatication Code Pada Sistem Keamanan Rumah." MIND Journal 1, no. 1 (2018): 9. http://dx.doi.org/10.26760/mindjournal.v1i1.9.
Full textAbdulla, Abdulla, and Yaseen Ismaeel. "Applying Message Authentication Code (MAC) in text chatting system." TANMIYAT AL-RAFIDAIN 30, no. 92 (2008): 9–18. http://dx.doi.org/10.33899/tanra.2008.161723.
Full textNoh, Jaewon, Sangil Jeon, and Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles." Electronics 9, no. 1 (2020): 74. http://dx.doi.org/10.3390/electronics9010074.
Full textHussain, S. M. Suhail, Shaik Mullapathi Farooq, and Taha Selim Ustun. "Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security." IEEE Access 7 (2019): 80980–84. http://dx.doi.org/10.1109/access.2019.2923728.
Full textZivic, Natasa. "Principles of Soft Verification." International Journal of Distributed Systems and Technologies 4, no. 1 (2013): 1–15. http://dx.doi.org/10.4018/jdst.2013010101.
Full textMuraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.
Full textJabiullah, Md Ismail, AA Md Monzur Ul Akhir, and Muhammed Rasheduzzaman. "A Double-Key Based Encryption-Decryption Process for Stronger Secured Message Transactions." GUB Journal of Science and Engineering 6, no. 1 (2020): 75–80. http://dx.doi.org/10.3329/gubjse.v6i1.52053.
Full textDissertations / Theses on the topic "Message authentication code (MAC)"
Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/24343.
Full textNEIMAN, ADAM M. "HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1130852252.
Full textTomaz, Antonio Emerson Barros. "Resgate de autoria em esquemas de assinatura em anel." reponame:Repositório Institucional da UFC, 2014. http://www.repositorio.ufc.br/handle/riufc/10842.
Full textWainewright, Evelyn. "Efficient Simulation for Quantum Message Authentication." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35213.
Full textJunior, Marcos Antonio Simplício. "Algoritmos de autenticação de mensagens para redes de sensores." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11082010-114456/.
Full textOliveira, Bruno Trevizan de. "Arquitetura de segurança fim-a-fim para redes de sensores sem fio." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-21062013-120411/.
Full textLee, Ming-hua, and 李明樺. "Construct Message Authentication Code with." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/43242182443745386123.
Full textLo, Yung-Lin, and 羅永霖. "Image Hiding with Message Authentication Code." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/99800662485507952037.
Full textLiang, Yin-Zhen, and 梁尹蓁. "Hardware Design of Constructing Message Authentication Code." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/97211273500370404576.
Full textCarvalho, Nuno Tiago Ferreira de. "A practical validation of Homomorphic Message Authentication schemes." Master's thesis, 2014. http://hdl.handle.net/1822/37266.
Full textBooks on the topic "Message authentication code (MAC)"
Technology), Information Technology Laboratory (National Institute of Standards and. The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). The keyed-hash message authentication code (HMAC). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Information Technology Laboratory, 2002.
Find full textE, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.
Find full textMartin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.
Full textBook chapters on the topic "Message authentication code (MAC)"
Pelzl, Jan, and Christof Paar. "Message Authentication Codes (MACs)." In Kryptografie verständlich. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49297-0_12.
Full textPaar, Christof, and Jan Pelzl. "Message Authentication Codes (MACs)." In Understanding Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3_12.
Full textWeik, Martin H. "message authentication code." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_11364.
Full textBernstein, Daniel J. "The Poly1305-AES Message-Authentication Code." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_3.
Full textBakhtiari, S., R. Safavi-Naini, and J. Pieprzyk. "A message authentication code based on latin squares." In Information Security and Privacy. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027926.
Full textLu, Jiqiang, Zhigang Zhao, and Huaqun Guo. "White-Box Implementation of the KMAC Message Authentication Code." In Information Security Practice and Experience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2_14.
Full textCary, Matthew, and Ramarathnam Venkatesan. "A Message Authentication Code Based on Unimodular Matrix Groups." In Advances in Cryptology - CRYPTO 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45146-4_29.
Full textYang, Feng, Cheng Zhong, and Danhua Lu. "Cross Message Authentication Code Based on Multi-core Computing Technology." In Advances in Intelligent and Soft Computing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29387-0_28.
Full textAlosaimy, Raed, Khaled Alghathbar, Alaaeldin M. Hafez, and Mohamed H. Eldefrawy. "NMACA Approach Used to Build a Secure Message Authentication Code." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17610-4_34.
Full textBlackburn, Simon R., and Kenneth G. Paterson. "Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan." In Fast Software Encryption. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25937-4_28.
Full textConference papers on the topic "Message authentication code (MAC)"
Echandouri, Bouchra, Charifa Hanin, Fouzia Omary, and Souad Elbernoussi. "LCAHASH-MAC: A new lightweight message authentication code using cellular automata for RFID." In 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, 2017. http://dx.doi.org/10.1109/wincom.2017.8238158.
Full textLan, Jingjing, Jun Zhou, and Xin Liu. "An area-efficient implementation of a Message Authentication Code (MAC) algorithm for cryptographic systems." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848369.
Full textSihite, Alfonso Brolin, and Muhammad Salman. "E-Voting and e-Recap Verification and Validation Schemes for Indonesia Utilizing Cryptographic Hash Function Message Authentication Codes (MAC) and Public Key Infrastructure (PKI)." In 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2019. http://dx.doi.org/10.1109/icimcis48181.2019.8985212.
Full textGoll, Martin, and Shay Gueron. "Vectorization of Poly1305 Message Authentication Code." In 2015 12th International Conference on Information Technology - New Generations (ITNG). IEEE, 2015. http://dx.doi.org/10.1109/itng.2015.28.
Full textVan, Dang Hai, and Nguyen Dinh Thuc. "A Privacy Preserving Message Authentication Code." In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292927.
Full textJun He and Hai-feng Qian. "Forward-secure aggregate message authentication code." In IET International Communication Conference on Wireless Mobile & Computing (CCWMC 2009). IET, 2009. http://dx.doi.org/10.1049/cp.2009.2044.
Full textChen, Dajiang, Shaoquan Jiang, and Zhiguang Qin. "Message Authentication Code over a wiretap channel." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282866.
Full textMichail, H. E., A. P. Kakarountas, G. Selimis, and C. E. Goutis. "Throughput Optimization of the Cipher Message Authentication Code." In 2007 15th International Conference on Digital Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icdsp.2007.4288627.
Full textRashwan, A. M., A.-E. M. Taha, and H. S. Hassanein. "Benchmarking message authentication code functions for mobile computing." In GLOBECOM 2012 - 2012 IEEE Global Communications Conference. IEEE, 2012. http://dx.doi.org/10.1109/glocom.2012.6503506.
Full textUllah, Ikram, Nirvana Meratnia, and Paul J. M. Havinga. "iMAC: Implicit Message Authentication Code for IoT Devices." In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, 2020. http://dx.doi.org/10.1109/wf-iot48130.2020.9221331.
Full textReports on the topic "Message authentication code (MAC)"
Smid, Miles E., Elaine Barker, David Balenson, and Martha Haykin. Message authentication code (MAC) validation system. National Bureau of Standards, 1988. http://dx.doi.org/10.6028/nbs.sp.500-156.
Full textGutmann, P. Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6476.
Full textDolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5830.
Full textOvsienko, D. Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7298.
Full textKrovetz, T., ed. UMAC: Message Authentication Code using Universal Hashing. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4418.
Full textMalhotra, A., and S. Goldberg. Message Authentication Code for the Network Time Protocol. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8573.
Full textSorce, S., and T. Yu. Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7751.
Full textEastlake, D. HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4635.
Full textMcGrew, D., and J. Viega. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4543.
Full textSchaad, J., and R. Housley. Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3537.
Full text