Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,539 papers from all fields of science
Search
Sign In
Create Free Account
Message authentication code
Known as:
Message footprint
, MIC
, Keyed hash function
Expand
In cryptography, a message authentication code (MAC) is a short piece of information used to authenticate a message—in other words, to confirm that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
Authenticated encryption
Block cipher
Block cipher mode of operation
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Physical Layer based Message Authentication with Secure Channel Codes
Dajiang Chen
,
Ning Zhang
,
Nan Cheng
,
Kuan Zhang
,
Zhiguang Qin
,
X. Shen
IEEE Transactions on Dependable and Secure…
2020
Corpus ID: 51962959
In this paper, we investigate physical (PHY) layer message authentication to combat adversaries with infinite computational…
Expand
Highly Cited
2015
Highly Cited
2015
The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)
Markku-Juhani O. Saarinen
,
Jean-Philippe Aumasson
Request for Comments
2015
Corpus ID: 46557876
This document describes the cryptographic hash function BLAKE2 and makes the algorithm specification and C source code…
Expand
Highly Cited
2014
Highly Cited
2014
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Olivier Blazy
,
Eike Kiltz
,
Jiaxin Pan
Annual International Cryptology Conference
2014
Corpus ID: 2661503
We provide a generic transformation from any affine message authentication code (MAC) to an identity-based encryption (IBE…
Expand
Highly Cited
2012
Highly Cited
2012
A combined approach to ensure data security in cloud computing
S. Sood
Journal of Network and Computer Applications
2012
Corpus ID: 44296462
Highly Cited
2007
Highly Cited
2007
A Framework for Iterative Hash Functions - HAIFA
E. Biham
,
O. Dunkelman
IACR Cryptology ePrint Archive
2007
Corpus ID: 607594
Since the seminal works of Merkle and Damgard on the iter- ation of compression functions, hash functions were built from compres…
Expand
Highly Cited
2005
Highly Cited
2005
The Poly1305-AES Message-Authentication Code
D. Bernstein
Fast Software Encryption Workshop
2005
Corpus ID: 10891203
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes…
Expand
Highly Cited
2001
Highly Cited
2001
Approximate image message authentication codes
L. Xie
,
G. Arce
,
R. Graveman
IEEE Trans. Multim.
2001
Corpus ID: 8869592
This paper introduces approximate image message authentication codes (IMACs) for soft image authentication. The proposed…
Expand
2000
2000
Message authentication codes
2000
Corpus ID: 263783387
In this thesis, we explore a topic within cryptography called Message Authentication Codes (MACs). A MAC is a collection of…
Expand
Highly Cited
1999
Highly Cited
1999
On the Security of Iterated Message Authentication Codes
B. Preneel
,
P. V. Oorschot
IEEE Transactions on Information Theory
1999
Corpus ID: 727115
The security of iterated message authentication code (MAC) algorithms is considered, and in particular, those constructed from…
Expand
Highly Cited
1985
Highly Cited
1985
Message authentication
R. R. Jueneman
,
Stephan M. Matyas
,
C. H. Meyer
IEEE Communications Magazine
1985
Corpus ID: 3157294
In the last chapter, we discussed the data integrity threats and the use of hashing technique to detect if any modification…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE