메뉴 건너뛰기




Volumn 8, Issue 7, 2009, Pages 968-974

Message authentication in computationally constrained environments

Author keywords

Challenge response; Constrained environments; HMAC; Secured communications; Stream ciphers

Indexed keywords

CHALLENGE RESPONSE; CONSTRAINED ENVIRONMENTS; HMAC; SECURED COMMUNICATIONS; STREAM CIPHERS;

EID: 67349199140     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2009.40     Document Type: Article
Times cited : (19)

References (35)
  • 4
    • 0013091373 scopus 로고    scopus 로고
    • The Keyed-Hash Message Authentication Code (HMAC)
    • National Institute of Standards and Technology, Information Technology Laboratory
    • National Institute of Standards and Technology, "The Keyed-Hash Message Authentication Code (HMAC)," FIPS PUB 198, Information Technology Laboratory, 2002.
    • (2002) FIPS PUB , vol.198
  • 6
    • 0003629991 scopus 로고
    • Secure Hash Standard
    • National Institute of Standards and Technology, Information Technology Laboratory
    • National Institute of Standards and Technology, "Secure Hash Standard," FIPS PUB 180-1, Information Technology Laboratory, 1995.
    • (1995) FIPS PUB , pp. 180-181
  • 11
    • 67349177669 scopus 로고    scopus 로고
    • E-Passports Can be Cloned in Minutes, Claims Researcher
    • Aug
    • PCWorld, "E-Passports Can be Cloned in Minutes, Claims Researcher,"pcworld.about.com/od/dataprotection/E-Passports-Can-Be-Cloned- in-M.htm, Aug. 2008.
    • (2008)
    • PCWorld1
  • 20
    • 34548830043 scopus 로고    scopus 로고
    • RFID Security Workshop (RFIDSec '06)
    • printed handout, July
    • M. Feldhofer and C. Rechberge, "A Case against Currently Used Hash Functions in RFID Protocols," RFID Security Workshop (RFIDSec '06), printed handout, July 2006.
    • (2006)
    • Feldhofer, M.1    Rechberge, C.2
  • 23
    • 67349279728 scopus 로고    scopus 로고
    • ECRYPT, The Estream Project, The eSTREAM Portfolio, revision 1, Sept. 2008.
    • ECRYPT, "The Estream Project," The eSTREAM Portfolio, revision 1, Sept. 2008.
  • 25
    • 67349277593 scopus 로고    scopus 로고
    • VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
    • Cryptology ePrint Archive, Report
    • B. Zoltak, "VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme," Cryptology ePrint Archive, Report 2004/ 301, 2004.
    • (2004) , vol.2004 , pp. 301
    • Zoltak, B.1
  • 26
    • 33746331948 scopus 로고    scopus 로고
    • Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive,
    • Ecrypt Stream Cipher Project, Report 2005/020
    • D. Whiting, B. Schneier, S. Lucks, and F. Muller, "Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive," Ecrypt Stream Cipher Project, Report 2005/020, 2005.
    • (2005)
    • Whiting, D.1    Schneier, B.2    Lucks, S.3    Muller, F.4
  • 27
    • 67349200155 scopus 로고    scopus 로고
    • ASC a Stream Cipher with Built in MAC Functionality
    • K. Wirt, "ASC a Stream Cipher with Built in MAC Functionality," Int'l J. Computer Science, vol. 2, pp. 131-136, 2007.
    • (2007) Int'l J. Computer Science , vol.2 , pp. 131-136
    • Wirt, K.1
  • 28
    • 48249092807 scopus 로고    scopus 로고
    • The Mundja Streaming MAC
    • Cryptology ePrint Archive, Report 2004/271
    • P. Hawkes, M. Paddon, and G.G. Rose, "The Mundja Streaming MAC," Cryptology ePrint Archive, Report 2004/271, 2004.
    • (2004)
    • Hawkes, P.1    Paddon, M.2    Rose, G.G.3
  • 29
    • 30344451674 scopus 로고    scopus 로고
    • Energy Scalable Universal Hashing
    • J. Kaps, K. Yuksel, and B. Sunar, "Energy Scalable Universal Hashing," IEEE Trans. Computers, vol. 54, pp. 1484-1495, 2005.
    • (2005) IEEE Trans. Computers , vol.54 , pp. 1484-1495
    • Kaps, J.1    Yuksel, K.2    Sunar, B.3
  • 31
    • 67349269402 scopus 로고    scopus 로고
    • B. Schneier, 'Schneier on Security' - SHA-1 Has Been Broken, http://www.schneier.com/blog/archives/2005/02/, 2009.
    • B. Schneier, "'Schneier on Security' - SHA-1 Has Been Broken," http://www.schneier.com/blog/archives/2005/02/, 2009.
  • 34
    • 33749544409 scopus 로고    scopus 로고
    • New Proofs for NMAC and HMAC: Security without Collision-Resistance
    • M. Bellare, "New Proofs for NMAC and HMAC: Security without Collision-Resistance," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '06), pp. 602-619, 2006.
    • (2006) Proc. Ann. Int'l Cryptology Conf. (CRYPTO '06) , pp. 602-619
    • Bellare, M.1
  • 35
    • 67349087857 scopus 로고    scopus 로고
    • C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier,T.Pornin,H.Sibert, andC.Berbain, EcryptPhase3DECIM 2 2007, http://www.ecrypt.eu.org/ stream/decimp3.html, 2009.
    • C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier,T.Pornin,H.Sibert, andC.Berbain, "EcryptPhase3DECIM 2 2007," http://www.ecrypt.eu.org/ stream/decimp3.html, 2009.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.