Please use this identifier to cite or link to this item:
|Title:||Cipher block based authentication module: a hardware design perspective||Authors:||Michail, Harris
Schinianakis, Dimitrios M.
Goutis, Costas E.
|Keywords:||Cryptography;Authentication;Hardware;Algorithms||Issue Date:||2011||Publisher:||World Scientiﬁc||Source:||Journal of Circuits, Systems and Computers, 2011, Volume 20, Issue 2, Pages 163-184||Abstract:||Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the transmitted data. However NIST in May 2005 issued a standard, addressing certain applications and their needs, defining a way to implement MACs through FIPS-approved and secure block cipher algorithms. In this paper the best performing implementation of the CMAC standard is presented, in terms of throughput, along with an efficient AES design and implementation.||URI:||http://ktisis.cut.ac.cy/handle/10488/7315||ISSN:||02181266||DOI:||10.1142/S0218126611007189||Rights:||© 2011 World Scientific Publishing Company||Type:||Article|
|Appears in Collections:||Άρθρα/Articles|
Show full item record
checked on Dec 13, 2018
WEB OF SCIENCETM
checked on Feb 17, 2019
checked on Feb 24, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.