Designated verifier signature schemes: Attacks, new security notions and a new construction

H Lipmaa, G Wang, F Bao - … , ICALP 2005, Lisbon, Portugal, July 11-15 …, 2005 - Springer
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …

A New MAC Construction ALRED and a Specific Instance ALPHA-MAC

J Daemen, V Rijmen - International Workshop on Fast Software …, 2005 - Springer
LNCS 3557 - A New MAC Construction <TEX>{\sc ALRED}</TEX> and a Specific Instance <TEX>{\sc
ALPHA-MAC}</TEX Page 1 A New MAC Construction Alred and a Specific Instance Alpha-MAC …

RFC 4226: HOTP: An HMAC-based one-time password algorithm

D M'Raihi, M Bellare, F Hoornaert, D Naccache… - 2005 - dl.acm.org
This document describes an algorithm to generate one-time password values, based on
Hashed Message Authentication Code (HMAC). A security analysis of the algorithm is …

Architectural characterization of processor affinity in network processing

A Foong, J Fung, D Newell, S Abraham… - … Analysis of Systems …, 2005 - ieeexplore.ieee.org
Network protocol stacks, in particular TCP/IP software implementations, are known for its
inability to scale well in general-purpose monolithic operating systems (OS) for SMP …

Single-key AIL-MACs from any FIL-MAC

U Maurer, J Sjödin - … : 32nd International Colloquium, ICALP 2005, Lisbon …, 2005 - Springer
We investigate a general paradigm for constructing arbitrary-input-length (AIL) MACs from
fixed-input-length (FIL) MACs, define the waste as the relevant efficiency parameter of such …

3C-A provably secure pseudorandom function and message authentication code. A new mode of operation for cryptographic hash function

P Gauravaram, W Millan, JG Nieto… - Cryptology ePrint …, 2005 - eprint.iacr.org
We propose a new cryptographic construction called 3C, which works as a pseudorandom
function (PRF), message authentication code (MAC) and cryptographic hash function. The …

Recent attacks on alleged securid and their practical implications

A Biryukov, J Lano, B Preneel - Computers & Security, 2005 - Elsevier
SecurID tokens are developed by SDTI/RSA Security to authenticate users to a corporate
computer infrastructure. In this paper we show the results of our analysis of the function …

[PDF][PDF] MAC based lightweight protocols for strong authentication and key exchange

D Trček - Journal of Information Sciences and Engineering, 2005 - Citeseer
Protocols that provide authentication and key distribution are mainly based on symmetric
and asymmetric ciphers. In recent years, some approaches have been introduced that are …

[PDF][PDF] New protocols for proving knowledge of arbitrary secrets while not giving them away

W Teepe - 2005 - research.rug.nl
University of Groningen New Protocols for Proving Knowledge of Arbitrary Secrets While not
Giving Them Away Teepe, Wouter Page 1 University of Groningen New Protocols for Proving …

[PDF][PDF] Analysis and Design of Authenticated Encryption Modes

EI Andreeva - 2005 - Citeseer
1.1 Background Nowadays, the realization of successful and reliable communication has
become a matter of usage of trustworthy technology. Hence, current systems require …