Designated verifier signature schemes: Attacks, new security notions and a new construction
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC
LNCS 3557 - A New MAC Construction <TEX>{\sc ALRED}</TEX> and a Specific Instance <TEX>{\sc
ALPHA-MAC}</TEX Page 1 A New MAC Construction Alred and a Specific Instance Alpha-MAC …
ALPHA-MAC}</TEX Page 1 A New MAC Construction Alred and a Specific Instance Alpha-MAC …
RFC 4226: HOTP: An HMAC-based one-time password algorithm
D M'Raihi, M Bellare, F Hoornaert, D Naccache… - 2005 - dl.acm.org
This document describes an algorithm to generate one-time password values, based on
Hashed Message Authentication Code (HMAC). A security analysis of the algorithm is …
Hashed Message Authentication Code (HMAC). A security analysis of the algorithm is …
Architectural characterization of processor affinity in network processing
Network protocol stacks, in particular TCP/IP software implementations, are known for its
inability to scale well in general-purpose monolithic operating systems (OS) for SMP …
inability to scale well in general-purpose monolithic operating systems (OS) for SMP …
Single-key AIL-MACs from any FIL-MAC
U Maurer, J Sjödin - … : 32nd International Colloquium, ICALP 2005, Lisbon …, 2005 - Springer
We investigate a general paradigm for constructing arbitrary-input-length (AIL) MACs from
fixed-input-length (FIL) MACs, define the waste as the relevant efficiency parameter of such …
fixed-input-length (FIL) MACs, define the waste as the relevant efficiency parameter of such …
3C-A provably secure pseudorandom function and message authentication code. A new mode of operation for cryptographic hash function
P Gauravaram, W Millan, JG Nieto… - Cryptology ePrint …, 2005 - eprint.iacr.org
We propose a new cryptographic construction called 3C, which works as a pseudorandom
function (PRF), message authentication code (MAC) and cryptographic hash function. The …
function (PRF), message authentication code (MAC) and cryptographic hash function. The …
Recent attacks on alleged securid and their practical implications
A Biryukov, J Lano, B Preneel - Computers & Security, 2005 - Elsevier
SecurID tokens are developed by SDTI/RSA Security to authenticate users to a corporate
computer infrastructure. In this paper we show the results of our analysis of the function …
computer infrastructure. In this paper we show the results of our analysis of the function …
[PDF][PDF] MAC based lightweight protocols for strong authentication and key exchange
D Trček - Journal of Information Sciences and Engineering, 2005 - Citeseer
Protocols that provide authentication and key distribution are mainly based on symmetric
and asymmetric ciphers. In recent years, some approaches have been introduced that are …
and asymmetric ciphers. In recent years, some approaches have been introduced that are …
[PDF][PDF] New protocols for proving knowledge of arbitrary secrets while not giving them away
W Teepe - 2005 - research.rug.nl
University of Groningen New Protocols for Proving Knowledge of Arbitrary Secrets While not
Giving Them Away Teepe, Wouter Page 1 University of Groningen New Protocols for Proving …
Giving Them Away Teepe, Wouter Page 1 University of Groningen New Protocols for Proving …
[PDF][PDF] Analysis and Design of Authenticated Encryption Modes
EI Andreeva - 2005 - Citeseer
1.1 Background Nowadays, the realization of successful and reliable communication has
become a matter of usage of trustworthy technology. Hence, current systems require …
become a matter of usage of trustworthy technology. Hence, current systems require …