搜索结果: 1-15 共查到“MAC”相关记录229条 . 查询时间(0.093 秒)
中国科学院声学研究所专利:一种基于业务区分的家庭同轴网络MAC层数据传输方法
中国科学院声学研究所 专利 业务区分 家庭同轴网络 MAC层 数据传输
font style='font-size:12px;'>
2023/4/3
中国大陆学者首获Mac Van Valkenburg奖
吴枫 Mac Van Valkenburg奖 网络流媒体
font style='font-size:12px;'>
2021/5/28
记者27日从中国科学技术大学获悉,电气电子工程师学会电路与系统协会(IEEE CAS)日前将2021年度Mac Van Valkenburg奖授予该校教授吴枫,以表彰他“对多媒体非均匀编码和通信的贡献”。这是该奖项历史上首次颁发给中国大陆的学者,也是该奖项时隔14年后再次颁发给华人学者。
中国科学院烟台海岸带研究所专利:基于基因重组藻蓝蛋白MAC和氧化石墨烯量子点的生物素化抗体传感器及其制备方法
中国科学院烟台海岸带研究所 专利 基因重组 藻蓝蛋白MAC 氧化石墨烯 量子点 生物素化 抗体传感器
font style='font-size:12px;'>
2024/5/23
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
secret-key cryptography MERS
font style='font-size:12px;'>
2019/4/23
This paper presents a novel, yet efficient secret-key authentication and MAC, which provide post-quantum security promise, whose security is reduced to the quantum-safe conjectured hardness of Mersenn...
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Graceful Security Faulty Nonce Mirror Theory
font style='font-size:12px;'>
2019/2/27
Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE). Unfortunately, almost all designs following the EtM paradigm, including the AE suites for TLS, are vulnerable against nonce ...
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
stream cipher RC4 VMPC-R
font style='font-size:12px;'>
2019/1/18
We propose an authenticated encryption scheme for the VMPC-R stream cipher. VMPC-R is an RC4-like algorithm proposed in 2013. It was created in a challenge to find a bias-free cipher within the RC4 de...
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
Keccak Keccak-MAC ordinary cube variables
font style='font-size:12px;'>
2018/9/6
In this paper, we present an alternative method to choose ordinary cube variables for Keccak-MAC. Firstly, we choose some good candidates for ordinary cube variables with key-independent conditions. T...
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
EDMEDM EWCDMEWCDM Mirror Theory
font style='font-size:12px;'>
2018/5/28
Non-adaptive Group-Testing Aggregate MAC Scheme
message authentication aggregate group testing
font style='font-size:12px;'>
2018/5/22
This paper applies non-adaptive group testing to aggregate message authentication code (MAC) and introduces non-adaptive group-testing aggregate MAC. After formalization of its syntax and security req...
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Symmetric-key cryptography message authentication code lightweight
font style='font-size:12px;'>
2018/4/17
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message int...
R-MAC - A lightwheight authentication protocol for RFID Tags
RFID MAC authentication
font style='font-size:12px;'>
2018/3/5
Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be clone...
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Keccak-MAC Divide-and-Conquer Attacks Cube Attacks
font style='font-size:12px;'>
2018/1/17
Keccak is the final winner of SHA-3 competition and it can be used as message authentic codes as well. The basic and balanced divide-and-conquer attacks on Keccak-MAC were proposed by Dinur et al. at ...
煤矿井下无线多媒体传感器网络区分服务的QoS-MAC协议
无线多媒体传感器网络(WMSNs) 煤矿井下 MAC协议 区分服务
font style='font-size:12px;'>
2018/4/18
归纳了煤矿井下传感数据业务、语音业务和视频业务的发送频次、带宽、时延和方向等特点以及对网络服务质量保障的要求,提出了一种煤矿井下无线多媒体传感器网络区分服务的QoS-MAC协议。通过为传感数据业务、语音业务和视频业务设计不同的竞争窗口,实现了3种业务的区分服务,可保障3种业务不同的服务质量需求。建立了3种业务退避级数和退避时间计数器的Markov链模型,分析了区分服务的QoS-MAC协议的饱和吞吐...
Tight Security Analysis of EHtM MAC
Probabilistic MAC EHtM XMACR
font style='font-size:12px;'>
2017/9/1
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness of the random salt which restricts the security to birthday bound of the salt size due to the collis...
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC
Encrypted Keyword Search Searchable Encryption Random Oracle Model
font style='font-size:12px;'>
2017/7/14
Outsourcing data storage to the cloud securely and retrieving the remote data in an efficient way is a very significant research topic, with high relevance to secure cloud deployment. With the ever gr...