Message authentication

Known as: Data Authentication, Data authenticity, Message authenticity 
In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1978-2018
05010015019782018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
In this paper, we introduce a novel roadside unit (RSU)-aided message authentication scheme named RAISE, which makes RSUs… (More)
  • figure 1
  • figure 3
  • table I
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message authentication… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) speci… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We describe a construction of almost universal hash functions suitable for very fast software implementation and applicable to… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Two parties communicating across an insecure channel need a method by which any attempt to modify the information sent by one to… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Fast message integrity and authentication services are much desired in today's high-speed network protocols. Current message… (More)
Is this relevant?