Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/13896
Title: | Throughput optimization of the cipher message authentication code | Authors: | Selimis, G. Michail, Harris Kakarountas, A. P. Goutis, C. E. |
Major Field of Science: | Engineering and Technology | Field Category: | Electrical Engineering - Electronic Engineering - Information Engineering | Keywords: | Hardware implementation;Message authentication code | Issue Date: | Aug-2007 | Source: | 2007 15th International Conference on Digital Signal Processing, DSP 2007, art. no. 4288627, pp. 495-498 | Conference: | International Conference on Digital Signal Processing | Abstract: | A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a different MAC will be produced if the message has changed - as well as its authenticity - because only someone who knows the secret key could be able to generate a valid MAC. The proposed process incorporates a FIPS approved anti secure block cipher algorithm which was standardized by NIST in May, 2005. The first implementation of the CMAC is presented in this paper. Throughput has been the main design target. The proposed implementation goes one step further introducing an optimized ciphering core to achieve competitive throughput for CMAC, compared to alternative MACs. © 2007 IEEE. | ISBN: | 978-142440882-5 | DOI: | 10.1109/ICDSP.2007.4288627 | Rights: | © 2007 IEEE | Type: | Conference Papers | Affiliation : | University of Patras | Publication Type: | Peer Reviewed |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
SCOPUSTM
Citations
50
5
checked on Mar 14, 2024
Page view(s)
288
Last Week
3
3
Last month
3
3
checked on Nov 7, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.