Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,161,761 papers from all fields of science
Search
Sign In
Create Free Account
Message authentication code
Known as:
Message footprint
, MIC
, Keyed hash function
Expand
In cryptography, a message authentication code (MAC) is a short piece of information used to authenticate a message—in other words, to confirm that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
Authenticated encryption
Block cipher
Block cipher mode of operation
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Message Authentication Codes (MACs)
C. Paar
,
J. Pelzl
2010
Corpus ID: 34551014
A Message Authentication Code (MAC), also known as a cryptographic checksum or a keyed hash function, is widely used in practice…
Expand
2008
2008
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Srdjan Capkun
,
Mario Cagalj
,
R. Rengaswamy
,
Ilias Tsigkogiannis
,
J. Hubaux
,
M. Srivastava
IEEE Transactions on Dependable and Secure…
2008
Corpus ID: 52869621
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g…
Expand
2006
2006
Approximate Message Authentication Codes for$N$-ary Alphabets
Renwei Ge
,
G. Arce
,
G. D. Crescenzo
IEEE Transactions on Information Forensics and…
2006
Corpus ID: 9006214
Approximate message authentication codes (AMACs) for binary alphabets have been introduced recently as noise-tolerant…
Expand
Highly Cited
2006
Highly Cited
2006
On Rateless Coding over Fading Channels with Delay Constraints
J. Castura
,
Yongyi Mao
,
S. Draper
IEEE International Symposium on Information…
2006
Corpus ID: 13854171
We explore the use of rateless coding for communication over fading channels with delay constraints. Both quasi-static fading and…
Expand
Review
2006
Review
2006
SIP Security Attacks and Solutions: A state-of-the-art review
S. E. Sawda
,
P. Urien
2nd International Conference on Information…
2006
Corpus ID: 18901066
The fundamental network-security services required for SIP are: preserving the confidentiality and integrity of messaging…
Expand
2005
2005
TCP Message Authentication Code Option
B. Weis
2005
Corpus ID: 63419157
This memo describes a TCP [RFC0793] extension to enhance security for BGP [I-D.ietf-idr-bgp4] and other TCP-based protocols…
Expand
2004
2004
FRMAC, a Fast Randomized Message Authentication Code
Éliane Jaulmes
,
R. Lercier
IACR Cryptology ePrint Archive
2004
Corpus ID: 2715031
We revisit the randomized approach followed in the design of the RMAC message authentication code in order to construct a MAC…
Expand
2004
2004
A note on the fragility of the "Michael" message integrity code
A. Wool
IEEE Transactions on Wireless Communications
2004
Corpus ID: 16206607
The IEEE 802.11 wireless local area network standard did not incorporate a cryptographic message integrity code into its wired…
Expand
1993
1993
Differential Attack on Message Authentication Codes
K. Ohta
,
M. Matsui
Annual International Cryptology Conference
1993
Corpus ID: 15343801
We discuss the security of Message Authentication Code (MAC) schemes from the viewpoint of differential attack, and propose an…
Expand
1991
1991
Cryptographic identification methods for smart cards in the process of standardization
H.-P. Konigs
IEEE Communications Magazine
1991
Corpus ID: 29421655
Identification using integrated-circuit cards in credit card format with a built-in microcontroller (smart cards) is examined…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE