Algorithmic number theory
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Introduction to Error Correcting Codes with Applications
An Introduction to Error Correcting Codes with Applications
Shift Register Sequences
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
On a conjectured ideal autocorrelation sequence and a related triple-error correcting cyclic code
IEEE Transactions on Information Theory
An Integrated ECC-MAC Based on RS Code
Transactions on Computational Science IV
Hi-index | 0.00 |
In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures.