نتایج جستجو برای: hmac

تعداد نتایج: 237  

2015
Mihir Bellare Anna Lysyanskaya

The security of HMAC is proven under the assumption that its compression function is a dual PRF, meaning a PRF when keyed by either of its two inputs. But, not only do we not know whether particular compression functions really are dual PRFs, we do not know if dual PRFs even exist. What if the goal is impossible? This paper addresses this with a foundational treatment of dual PRFs, giving const...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

2009
Binod Vaidya Jong Hyuk Park Joel J. P. C. Rodrigues

Home networks are one of the focused areas of research these days. One of the important services that home networks provide is to remotely control home appliances in home network. However, the remote control service causes home networks to have various security threats. Hence, home networks should provide strong security services, especially remote user authentication. In this paper, we provide...

Journal: :IEEE Access 2021

Fog-to-cloud computing has now become a new cutting-edge technique along with the rapid popularity of Internet Things (IoT). Unlike traditional cloud computing, fog-to-cloud needs more entities to participate in, including mobile sinks and fog nodes except for service provider (CSP). Hence, integrity auditing in storage will also be different from that storage. In recent work Tian et al., they ...

2010
Zhijun Li Guang Gong

Designing secure data aggregation schemes, which are critical to many sensor network applications, imposes interesting and formidable challenges. In this paper, we propose a succinct and practical secure aggregation protocol by combining HMAC (associated with a cryptographic hash function) with Bloom filter, which then is defined as secure Bloom filter. Unlike most previous approaches, which ar...

2012
Marcin Rogawski Kris Gaj

The NIST competition for developing the new cryptographic hash algorithm SHA-3 is currently in the third round. One of the five reminding candidates, namely Grøstl, is inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical solutions. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, in...

Journal: :IACR Cryptology ePrint Archive 2008
Donghoon Chang Seokhie Hong Jaechul Sung Sangjin Lee

We propose a new hash domain extension a prefix-free-Counter-MaskingMD (pfCM-MD). And, among security notions for the hash function, we focus on the indifferentiable security notion by which we can check whether the structure of a given hash function has any weakness or not. Next, we consider the security of HMAC, two new prf constructions, NIST SP 800-56A key derivation function, and the rando...

2013
V. Abinaya V. Ramesh

Attribute-based encryption (ABE) is a standard encryption that allows users to encrypt and decrypt data based on user attributes. I t is extension o f attribute set based encryption to improve scalability and flexibility w hile at the same time Inherits the feature of fine grained access control of ABE.It is flexible access control of encrypted data stored in the cloud. It is using access polic...

2004
Tadayoshi Kohno

Analysis of the WinZip en ryption method Tadayoshi Kohno May 8, 2004 Abstra t WinZip is a popular ompression utility for Mi rosoft Windows omputers, the latest version of whi h is advertised as having \easy-to-use AES en ryption to prote t your sensitive data." We exhibit several atta ks against WinZip's new en ryption method, dubbed \AE-2" or \Advan ed En ryption, version two." We then dis uss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید