[PDF][PDF] MMAC: Fast and Secure Message Authentication

MA Mohammed, LK Abood, M Maliki - academia.edu
The Mathematical Message Authentication Code (MMAC) is a well-known method to provide
integrity of message. This works aims to proof that the MMAC is more reliable than …

UMAC: Fast and secure message authentication

J Black, S Halevi, H Krawczyk, T Krovetz… - Advances in Cryptology …, 1999 - Springer
We describe a message authentication algorithm, UMAC, which can authenticate messages
(in software, on contemporary machines) roughly an order of magnitude faster than current …

Implementation of HMAC using SHA

S Vemulapalli, V Trullinger - Citeseer
Providing a way to check the integrity of information transmitted over an unreliable medium
is a prime necessity in the world of open computing and communications. Message …

[PDF][PDF] Advancing the Cryptographic Hash-Based Message authentication Code

M Kumar, A Avasthi, G Mishra - International Journal of Engineering …, 2011 - academia.edu
In today's word the authentication is very much required for the purpose of the transfer of the
information from one place to another. Now a day's the use of E-mail become very popular …

[PDF][PDF] Mathematical Message Authentication Code Using S-Box key

MA Mohammed, LK Abood, M Maliki - IJCSNS, 2017 - researchgate.net
In recent year the exchange of information is become widely used. This information is
accessible to all, so security is one of the important concept should provide for this …

A state-of-the-art message-authentication code

DJ Bernstein - Available in< http://cr. yp. to/mac. html, 2005 - cr.yp.to
Poly1305-AES computes a 16-byte authenticator of a message of any length, using a 16-
byte nonce (unique message number) and a 32-byte secret key. Attackers can't modify or …

The BCH-NTMAC for noisy message authentication

Y Liu, C Boncelet - 2006 40th Annual Conference on …, 2006 - ieeexplore.ieee.org
We present a new message authentication code (MAC) called the BCH-NTMAC. The BCH-
NTMAC improves on the recently developed CRC-NTMAC and the NTMAC. Similar to the …

[HTML][HTML] Message authentication codes

M Rosulek - The Joy of Cryptography OE (1st), 2017 - open.oregonstate.education
Discussion We do allow the adversary to request MACs of chosen messages, hence the
GETMAC subroutine. This means that the adversary is always capable of obtaining valid …

Message authentication code with blind factorization and randomization

L Ghouti, MK Ibrahim - US Patent 8,190,892, 2012 - Google Patents
The message authentication code with blind factorization and randomization is a
computational method for improving the security of existing Message Authentication Code …

[引用][C] Efficient authentication for mobile and prevasive computing

M Tamboli - 2022 - AIKTC