Sciweavers

119 search results - page 16 / 24
» Cryptanalysis of Message Authentication Codes
Sort
View
ICIP
2005
IEEE
14 years 9 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
INFOCOM
2002
IEEE
14 years 13 days ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
CSFW
2007
IEEE
14 years 1 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
FSE
2010
Springer
146views Cryptology» more  FSE 2010»
13 years 10 months ago
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
This paper provides a unified framework for improving PRF (pseudorandom function) advantages of several popular MACs (message authentication codes) based on a blockcipher modeled a...
Mridul Nandi