Results 1 - 10
of
65
The Security of the Cipher Block Chaining Message Authentication Code
, 2000
"... Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) specifies that an m-block message x: Xl...xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of ym, where Y0: 01 and Y ..."
Abstract
-
Cited by 240 (41 self)
- Add to MetaCart
Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) specifies that an m-block message x: Xl...xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of ym, where Y0: 01
The Security of Cipher Block Chaining
, 1994
"... The Cipher Block Chaining -- Message Authentication Code (CBC MAC) specifies that a message x = x 1 \Delta \Delta \Delta xm be authenticated among parties who share a secret key a by tagging x with a prefix of f (m) a (x) def = f a (f a (\Delta \Delta \Delta f a (f a (x 1 )\Phix 2 )\Phi \Delta ..."
Abstract
-
Cited by 171 (28 self)
- Add to MetaCart
The Cipher Block Chaining -- Message Authentication Code (CBC MAC) specifies that a message x = x 1 \Delta \Delta \Delta xm be authenticated among parties who share a secret key a by tagging x with a prefix of f (m) a (x) def = f a (f a (\Delta \Delta \Delta f a (f a (x 1 )\Phix 2 )\Phi
Cipher Block Chaining Message Authentication Code
, 2007
"... 1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance 1.2 07-Dec-2007 Added P5CD012V0B as new supported hardware configuration Contact information ..."
Abstract
- Add to MetaCart
1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance 1.2 07-Dec-2007 Added P5CD012V0B as new supported hardware configuration Contact information
Cipher Block Chaining (a block cipher mode of operation) Cipher Block Chaining Message Authentication Code
, 2008
"... 1.0 08-Jul-2008 Derived from Security Target, no changes Contact information ..."
Abstract
- Add to MetaCart
1.0 08-Jul-2008 Derived from Security Target, no changes Contact information
Cipher Block Chaining (a block cipher mode of operation) Cipher Block Chaining Message Authentication Code
, 2008
"... 1.0 08-Jul-2008 Derived from Security Target, no changes Contact information ..."
Abstract
- Add to MetaCart
1.0 08-Jul-2008 Derived from Security Target, no changes Contact information
Cipher Block Chaining (a block cipher mode of operation) Cipher Block Chaining Message Authentication Code
, 2008
"... 1.0 08-Jul-2008 Derived from Security Target, no changes Contact information ..."
Abstract
- Add to MetaCart
1.0 08-Jul-2008 Derived from Security Target, no changes Contact information
Cipher Block Chaining (a block cipher mode of operation) Cipher Block Chaining Message Authentication Code
, 2007
"... 1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance Contact information ..."
Abstract
- Add to MetaCart
1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance Contact information
Cipher Block Chaining (a block cipher mode of operation) Cipher Block Chaining Message Authentication Code
, 2007
"... 1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance Contact information ..."
Abstract
- Add to MetaCart
1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance Contact information
Cipher Block Chaining (a block cipher mode of operation) Cipher Block Chaining Message Authentication Code
, 2007
"... 1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance Contact information ..."
Abstract
- Add to MetaCart
1.0 29-Oct-2007 Derived from Security Target, no changes 1.1 07-Nov-2007 Updated Reference to new Version of AES User Guidance Contact information
A Comparative study of Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) and
, 2013
"... With the increase in use of wireless network, the initial protocols, as first, Wireless Equivalent Privacy (WEP), then Wi-Fi Protected Access (WPA) was used to secure wireless communications. In this paper, a comparison study is carried out in between Counter mode with Cipher block chaining Message ..."
Abstract
- Add to MetaCart
With the increase in use of wireless network, the initial protocols, as first, Wireless Equivalent Privacy (WEP), then Wi-Fi Protected Access (WPA) was used to secure wireless communications. In this paper, a comparison study is carried out in between Counter mode with Cipher block chaining Message
Results 1 - 10
of
65