Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,208 papers from all fields of science
Search
Sign In
Create Free Account
CBC-MAC
In cryptography, a cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Block cipher
Block cipher mode of operation
CRYPTREC
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A time-spectral method for initial-value problems using a novel spatial subdomain scheme
K. Lindvall
,
J. Scheffel
2017
Corpus ID: 53545610
Abstract We analyse a novel subdomain scheme for time-spectral solution of initial-value partial differential equations. In…
Expand
Highly Cited
2015
Highly Cited
2015
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gazi
,
Krzysztof Pietrzak
,
Stefano Tessaro
Annual International Cryptology Conference
2015
Corpus ID: 16586654
This paper studies the concrete security of PRFs and MACs obtained by keying hash functions based on the sponge paradigm. One…
Expand
2013
2013
Accelerating Encryption Algorithms Using Parallelism
Cristina-Loredana Duta
,
Gicu Michiu
,
Silviu Stoica
,
L. Gheorghe
Computer Science in Cars Symposium
2013
Corpus ID: 18662348
The importance of protecting the information has increased rapidly during the last decades and as a consequence so did the need…
Expand
2010
2010
Direction finding of signal subspace fitting based on cultural bee colony algorithm
Hongyuan Gao
,
Xiao Han
International Conference on Bio-Inspired…
2010
Corpus ID: 9036953
Based on weighted signal subspace fitting and the minimum redundant array, a minimum redundant-weighted signal subspace fitting…
Expand
2009
2009
Distinguishing and Second-Preimage Attacks on CBC-Like MACs
Keting Jia
,
Xiaoyun Wang
,
Zheng Yuan
,
Guangwu Xu
Cryptology and Network Security
2009
Corpus ID: 1206777
This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining…
Expand
2009
2009
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks
A. Rajaram
,
Dr. S. Palaniswami
arXiv.org
2009
Corpus ID: 1937668
In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and…
Expand
2008
2008
Novel conjugate-gradient based complex adaptive ICA for diversity QPSK receivers in time-varying channel applications
W. Mikhael
,
R. Ranganathan
,
Thomas T. Yang
IEEE Radio and Wireless Symposium
2008
Corpus ID: 10288331
In this paper, a novel conjugate-gradient based complex independent component analysis algorithm (CBC- ICA) for processing…
Expand
2003
2003
On the security of XCBC, TMAC and OMAC
C. Mitchell
2003
Corpus ID: 8514728
The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes. The results imply that…
Expand
Review
2001
Review
2001
New CBC-MAC Forgery Attacks
K. Brincat
,
C. Mitchell
Australasian Conference on Information Security…
2001
Corpus ID: 12508612
This paper is concerned with a particular type of attack against CBC-MACs, namely forgery attacks, i.e. attacks which enable an…
Expand
1997
1997
Chosen-text attack on CBC-MAC
L. Knudsen
1997
Corpus ID: 62173164
The author presents a new chosen-text attack on the CBC-MAC, which based on DES, is a widely used algorithm to compute a message…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE