Differential attack on message authentication codes
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Message Authentication Codes with Error Correcting Capabilities
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Message Authentication Codes
ISW '97 Proceedings of the First International Workshop on Information Security
An Improved Double Byte Error Correcting Code Using Cellular Automata
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Crossword puzzle attack on NLS
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Strengthening NLS against crossword puzzle attack
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
The CRC–NTMAC for Noisy Message Authentication
IEEE Transactions on Information Forensics and Security
Construction of nonlinear resilient Boolean functions using "small" affine functions
IEEE Transactions on Information Theory
Null boundary 90/150 cellular automata for multi-byte error correcting code
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Hi-index | 0.00 |
This paper presents a message authentication code (MAC) with error-correcting capabilities which can be used for wireless transmission. Also the paper introduces a new nonlinear mixing function `Nmix ' which is cryptographically strong compared to other existing method and secured against linear, differential and other conventional cryptanalysis. This nonlinear function is used to compute proposed MAC from check symbols of Reed-Solomon (RS) code. Our MAC is shown to be secured even if a fixed pad is used in MAC generation.