Sciweavers

66 search results - page 5 / 14
» Universal Hashing and Authentication Codes
Sort
View
INDOCRYPT
2004
Springer
14 years 1 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
ITCC
2005
IEEE
14 years 1 months ago
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present...
T. S. Ganesh, T. S. B. Sudarshan
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication
In this paper we present a DCT domain watermarking approach for H.264/AVC video coding standard. This scheme is resilient to compressed-domain temporal adaptation. A cryptographic...
Sharmeen Shahabuddin, Razib Iqbal, Shervin Shirmoh...
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 11 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang