Take a bite of the reality sandwich: revisiting the security of progressive message authentication codes

E Wagner, J Bauer, M Henze - … of the 15th ACM Conference on Security …, 2022 - dl.acm.org
Message authentication guarantees the integrity of messages exchanged over untrusted
channels. However, to achieve this goal, message authentication considerably expands …

A security framework for military application on infrastructure based wireless sensor network

S Roy, MJ Nene - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
This paper presents an overview on design of a security framework for Wireless Sensor
Network (WSN). This framework is proposed for an infrastructure based deployment of the …

Practical Intranet Security: Overview of the State of the Art and Available Technologies

PM Ashley, M Vandenwauver - 1999 - books.google.com
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which
an intranet can be violated and gives a thorough review of the technologies that can be used …

Reinventing the Travois: Encryption/MAC in 30 ROM bytes

G Yuval - International Workshop on Fast Software Encryption, 1997 - Springer
Reinventing the travois: Encryption/MAC in 30 ROM bytes Page 1 Reinventing the Travois:
Encryption/MAC in 30 ROM Bytes Gideon Yuval Microsoft Research, Redmond, WA 98052 …

Secure island computing system and method

G Fielder - US Patent 8,479,021, 2013 - Google Patents
A method for generating an n-bit result includes a secured containment device (SCD)
receiving a request to generate the n-bit result. The request includes an n-bit generator input …

Consumable authentication protocol and system

SR Walmsley - US Patent 6,816,968, 2004 - Google Patents
Manufacturers of Systems that require consumables, Such as a laser printer that requires
toner cartridges, have Struggled with the problem of authenticating consumables, to varying …

Domain extension for MACs beyond the birthday barrier

Y Dodis, J Steinberger - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
Given an n-bit to n-bit MAC (eg, a fixed key blockcipher) with MAC security ε against q
queries, we design a variable-length MAC achieving MAC security O (εq, poly (n)) against …

[PDF][PDF] JAMBU lightweight authenticated encryption mode and AES-JAMBU

H Wu, T Huang - CAESAR competition proposal, 2014 - csrc.nist.gov
In this paper, we propose a lightweight authenticated encryption mode JAMBU. It only needs
n-bit extra register for a block cipher with 2n-bit block size. It achieves n-bit authentication …

MAC reforgeability

J Black, M Cochran - … Encryption: 16th International Workshop, FSE 2009 …, 2009 - Springer
Abstract Message Authentication Codes (MACs) are core algorithms deployed in virtually
every security protocol in common usage. In these protocols, the integrity and authenticity of …

Architectural characterization of processor affinity in network processing

A Foong, J Fung, D Newell, S Abraham… - … Analysis of Systems …, 2005 - ieeexplore.ieee.org
Network protocol stacks, in particular TCP/IP software implementations, are known for its
inability to scale well in general-purpose monolithic operating systems (OS) for SMP …