Take a bite of the reality sandwich: revisiting the security of progressive message authentication codes
Message authentication guarantees the integrity of messages exchanged over untrusted
channels. However, to achieve this goal, message authentication considerably expands …
channels. However, to achieve this goal, message authentication considerably expands …
A security framework for military application on infrastructure based wireless sensor network
This paper presents an overview on design of a security framework for Wireless Sensor
Network (WSN). This framework is proposed for an infrastructure based deployment of the …
Network (WSN). This framework is proposed for an infrastructure based deployment of the …
Practical Intranet Security: Overview of the State of the Art and Available Technologies
PM Ashley, M Vandenwauver - 1999 - books.google.com
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which
an intranet can be violated and gives a thorough review of the technologies that can be used …
an intranet can be violated and gives a thorough review of the technologies that can be used …
Reinventing the Travois: Encryption/MAC in 30 ROM bytes
G Yuval - International Workshop on Fast Software Encryption, 1997 - Springer
Reinventing the travois: Encryption/MAC in 30 ROM bytes Page 1 Reinventing the Travois:
Encryption/MAC in 30 ROM Bytes Gideon Yuval Microsoft Research, Redmond, WA 98052 …
Encryption/MAC in 30 ROM Bytes Gideon Yuval Microsoft Research, Redmond, WA 98052 …
Secure island computing system and method
G Fielder - US Patent 8,479,021, 2013 - Google Patents
A method for generating an n-bit result includes a secured containment device (SCD)
receiving a request to generate the n-bit result. The request includes an n-bit generator input …
receiving a request to generate the n-bit result. The request includes an n-bit generator input …
Consumable authentication protocol and system
SR Walmsley - US Patent 6,816,968, 2004 - Google Patents
Manufacturers of Systems that require consumables, Such as a laser printer that requires
toner cartridges, have Struggled with the problem of authenticating consumables, to varying …
toner cartridges, have Struggled with the problem of authenticating consumables, to varying …
Domain extension for MACs beyond the birthday barrier
Y Dodis, J Steinberger - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
Given an n-bit to n-bit MAC (eg, a fixed key blockcipher) with MAC security ε against q
queries, we design a variable-length MAC achieving MAC security O (εq, poly (n)) against …
queries, we design a variable-length MAC achieving MAC security O (εq, poly (n)) against …
[PDF][PDF] JAMBU lightweight authenticated encryption mode and AES-JAMBU
In this paper, we propose a lightweight authenticated encryption mode JAMBU. It only needs
n-bit extra register for a block cipher with 2n-bit block size. It achieves n-bit authentication …
n-bit extra register for a block cipher with 2n-bit block size. It achieves n-bit authentication …
MAC reforgeability
J Black, M Cochran - … Encryption: 16th International Workshop, FSE 2009 …, 2009 - Springer
Abstract Message Authentication Codes (MACs) are core algorithms deployed in virtually
every security protocol in common usage. In these protocols, the integrity and authenticity of …
every security protocol in common usage. In these protocols, the integrity and authenticity of …
Architectural characterization of processor affinity in network processing
Network protocol stacks, in particular TCP/IP software implementations, are known for its
inability to scale well in general-purpose monolithic operating systems (OS) for SMP …
inability to scale well in general-purpose monolithic operating systems (OS) for SMP …