Search Results - message authentication using

Search alternatives:

Refine Results
  1. 1

    Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol by Al-Alak, Saif M. Kh.

    Published 2014
    “…The time of message authentication operation in the IEEE 802.15.4 WSN is decreased by DMAC. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol by Jaisan S M, Ashish

    Published 2024
    “…This study proposes SECS/GEM-AE, a mechanism for securing SECS/GEM data messages using AES-GCM encryption and evaluates its performance against the standard SECS/GEM protocol and SECS/GEMsec, a security mechanism proposed to authenticate SECS/GEM messages.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine by Mat Isa, Mohd Anuar, Ahmad, Miza Mumtaz, Mohd Sani, Nor Fazlida, Hashim, Habibah, Mahmod, Ramlan

    Published 2014
    “…In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node by Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat

    Published 2012
    “…It is well known that the existing weak mechanism for authenticating binding update messages is one of the biggest security weaknesses in MIPv6. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Increase throughput of CCM security mode using MKP by Ahmad Zulkarnain, Zuriati

    Published 2014
    “…A security protocol is used to ensure the messages transferred over a network free from attack. …”
    Get full text
    Get full text
    Article
  11. 11

    A Chaos-Based Authenticated Cipher with Associated Data by Je, Sen Teh, Samsudin, Azman

    Published 2017
    “…The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. …”
    Get full text
    Get full text
    Article
  12. 12

    A Chaos-Based Authenticated Cipher with Associated Data by Je, Sen Teh, Samsudin, Azman

    Published 2017
    “…The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A threshold authenticated encryption scheme using hybrid problems by Mohamad, Mohd Saiful Adli, Ismail, E. S.

    Published 2014
    “…In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A new tunnelled EAP based authentication method for WiMAX networks by Alezabi, Kamal Ali Ahmed, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2013
    “…PKMv2 uses either RSA-based or EAP-based authentication modes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    STITCH-256: A dedicated cryptographic hash function by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.

    Published 2023
    “…Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
    Article
  17. 17

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…In public key cryptography, a pair of keys will be used, public key to encrypt the message and private key to decrypt the message. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Character property method with biometric multifactor authentication for arabic text steganography by Roslan, Nuur Alifah

    Published 2018
    “…We apply biometric multi factor authentication to enhance the security of the transmitted shared secret key used to extract the stego-text. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper