نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

2003
Ted Taekyoung Kwon Seongan Lim

This paper presents an automation-considered logic of authentication for reasoning about principals’ belief on authentication and key distribution protocols. The so-called ASVO logic is based upon the famous SVO logic but designed in the slightly different way that minimizes the protocol idealization needs. For the purpose, message receiving and message recognition are reformulated in the simil...

Journal: :IACR Cryptology ePrint Archive 2017
Sergey Agievich

We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The resulting polynomial hash value is encrypted again and becomes an authentication tag. We prove the prf-security of the EHE scheme and extend it to two authenticated encryption modes which follow the...

Journal: :EMISA Forum 2000
Petra Wohlmacher

SCHLÜSSELWÖRTER Sicherheitsanforderung, Sicherheitsmechanismus, Vertraulichkeit, Integrität, Authentizität, Nichtabstreitbarkeit, Kryptosystem, Session-Key-Verfahren, One-WayHashfunktion, Trapdoor-One-Way-Funktion, Message Authentication Code, Digitale Signatur, Authentifizierungsprotokoll, Challenge&Response-Protokoll, Sicherheitsinfrastruktur, Trust Center, Public-KeyInfrastruktur, Originalität.

2003
Yanjiang Yang Feng Bao Robert H. Deng

In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility lies in the fact that with only one piece of authenticating data (e.g., digital signature or message authentication code) spanning all blocks, each block can be independently authenticated while ignoring the other blo...

Journal: :Journal of Computer Security 2011
Basel Alomair Loukas Lazos Radha Poovendran

In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number generation. For parties equipped with a good source of randomness and a secure cryptographic primitive to authenticate messages, the literature of cryptography is rich with wellstu...

Journal: :JNW 2013
Pinghui Zou

Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of ...

1997
Shahram Bakhtiari Reihaneh Safavi-Naini Josef Pieprzyk

This is a proposal on the construction of a Message Authen-tication Code (MAC) based on Latin Squares. The design is inspired by Wegman-Carter construction which takes advantage of provable security. The MAC is described and its security is examined. It is also compared with other MACs and its advantages are shown.

2018
Qinlong Huang Yixian Yang Yuxiang Shi

With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained m...

Journal: :CoRR 2010
Harshvardhan Tiwari Krishna Asawa

Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید