Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,651,527 papers from all fields of science
Search
Sign In
Create Free Account
CBC-MAC
In cryptography, a cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Block cipher
Block cipher mode of operation
CRYPTREC
Chip Authentication Program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A time-spectral method for initial-value problems using a novel spatial subdomain scheme
Kristoffer Lindvall
,
J. Scheffel
2017
Corpus ID: 53545610
Abstract We analyse a novel subdomain scheme for time-spectral solution of initial-value partial differential equations. In…
Expand
2013
2013
Accelerating Encryption Algorithms Using Parallelism
Cristina-Loredana Duta
,
Gicu Michiu
,
Silviu Stoica
,
L. Gheorghe
Computer Science in Cars Symposium
2013
Corpus ID: 18662348
The importance of protecting the information has increased rapidly during the last decades and as a consequence so did the need…
Expand
Review
2013
Review
2013
Non-Invasive Hemoglobin Measurements In Anemic Patients
J. Goy
,
Ruth Namazzi
,
+5 authors
M. Crowther
2013
Corpus ID: 67929753
Background Non-invasive Hemoglobin Measurement (NIHM) devices have recently become available in clinical practice. These point-of…
Expand
2010
2010
Direction finding of signal subspace fitting based on cultural bee colony algorithm
Hongyuan Gao
,
Xiao Han
International Conference on Bio-Inspired…
2010
Corpus ID: 9036953
Based on weighted signal subspace fitting and the minimum redundant array, a minimum redundant-weighted signal subspace fitting…
Expand
2009
2009
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks
A. Rajaram
,
Dr. S. Palaniswami
arXiv.org
2009
Corpus ID: 1937668
In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and…
Expand
2009
2009
ANÁLISIS RETROSPECTIVO DEL CARCINOMA CUTÁNEO TIPO BASOCELULAR Y ESCAMOCELULAR EN BOGOTÁ-COLOMBIA: EPIDEMIOLOGÍA, PREVENCIÓN Y TRATAMIENTO
Oscar Iván Barón Estrada
,
J. A. Sierra
,
G. Gómez
2009
Corpus ID: 53787032
Antecedentes . El carcinoma cutaneo no melanoma del tipo basocelular (CBC) y escamocelular (CEC), tiene tasas de incidencia…
Expand
2008
2008
Novel conjugate-gradient based complex adaptive ICA for diversity QPSK receivers in time-varying channel applications
W. Mikhael
,
R. Ranganathan
,
Thomas T. Yang
IEEE Radio and Wireless Symposium
2008
Corpus ID: 10288331
In this paper, a novel conjugate-gradient based complex independent component analysis algorithm (CBC- ICA) for processing…
Expand
2003
2003
On the security of XCBC, TMAC and OMAC
C. Mitchell
2003
Corpus ID: 8514728
The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes. The results imply that…
Expand
Review
2001
Review
2001
New CBC-MAC Forgery Attacks
K. Brincat
,
C. Mitchell
Australasian Conference on Information Security…
2001
Corpus ID: 12508612
This paper is concerned with a particular type of attack against CBC-MACs, namely forgery attacks, i.e. attacks which enable an…
Expand
1997
1997
Chosen-text attack on CBC-MAC
L. Knudsen
1997
Corpus ID: 62173164
The author presents a new chosen-text attack on the CBC-MAC, which based on DES, is a widely used algorithm to compute a message…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE