Ordering Up aMAC
نویسندگان
چکیده
منابع مشابه
Aggregated Authentication (AMAC) Using Universal Hash Functions
Aggregation is a very important issue to reduce the energy consumption in Wireless Sensors Networks (WSNs). There is currently a lack of cryptographic primitives for authentication of aggregated data. The theoretical background for Aggregated Message Authentication Codes (AMACs) has been proposed by Chan and Castelluccia at ISIT 08. In this paper, we propose a MAC design based on universal hash...
متن کاملHow to Brew-up a Refinement Ordering
Fifty years ago there were few mathematical models of program semantics, perhaps none. Now there is probably a new one created every day. How do we do it? How should we do it? In our community we understand the utility of the refinement order, and we believe that each fresh semantics should come equipped with one. Although refinement’s general principles are well understood, it is still not so ...
متن کاملSpeeding up deciphering by hypergraph ordering
The “Gluing Algorithm” of Semaev [Des. Codes Cryptogr. 49 (2008), 47–60] — that finds all solutions of a sparse system of linear equations over the Galois field GF (q) — has average running time O(mq| k 1Xj |), where m is the total number of equations, and ∪k1Xj is the set of all unknowns actively occurring in the first k equations. Our goal here is to minimize the exponent of q in the case whe...
متن کاملA new 2D block ordering system for wavelet-based multi-resolution up-scaling
A complete and accurate analysis of the complex spatial structure of heterogeneous hydrocarbon reservoirs requires detailed geological models, i.e. fine resolution models. Due to the high computational cost of simulating such models, single resolution up-scaling techniques are commonly used to reduce the volume of the simulated models at the expense of losing the precision. Several multi-scale ...
متن کاملHash-Function Based PRFs: AMAC and Its Multi-User Security
AMAC is a simple and fast candidate construction of a PRF from an MD-style hash function which applies the keyed hash function and then a cheap, un-keyed output transform such as truncation. Spurred by its use in the widely-deployed Ed25519 signature scheme, this paper investigates the provable PRF security of AMAC to deliver the following three-fold message: (1) First, we prove PRF security of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1997
ISSN: 0028-0836,1476-4687
DOI: 10.1038/386554a0