Amanote Research

Amanote Research

    RegisterSign In

Delayed-Key Message Authentication for Streams

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-11799-2_18
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2010

Authors
Marc FischlinAnja Lehmann
Publisher

Springer Berlin Heidelberg


Related search

A Tight Bound for Exhaustive Key Search Attacks Against Message Authentication Codes

RAIRO - Theoretical Informatics and Applications
MathematicsComputer Science ApplicationsSoftware
2012English

Authentication Time of IEEE 802.15.4 With Multiple-Key Protocol Using Distributed Message Authentication Code Algorithm

Research Journal of Information Technology
Computer Science
2012English

Message Authentication Code Based Secure Group Key Management Protocol for Mobile Ad Hoc Networks

Journal of Computer Science
Computer NetworksSoftwareArtificial IntelligenceCommunications
2013English

Assessment Simulation Model for Uncoupled Message Authentication

2017English

Efficient Parallel-Pipelined GHASH for Message Authentication

2012English

Secret Key Transaction Authentication for DNS (TSIG)

2000English

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications

Internet Technology Letters
2018English

Key Minimal Authentication Systems for Unconditional Secrecy

English

Short Message (Service) as Key for Steganography

Research Journal of Information Technology
Computer Science
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy