Sciweavers

119 search results - page 7 / 24
» Cryptanalysis of Message Authentication Codes
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 18 days ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 1 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
14 years 21 days ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 3 days ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
ICIP
2006
IEEE
14 years 9 months ago
Tamper-Localization Watermarking with Systematic Error Correcting Code
Abstract-- This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise Tampering-Localiza...
Yongdong Wu