完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Yeh, YS | en_US |
dc.contributor.author | Wang, CC | en_US |
dc.date.accessioned | 2014-12-08T15:46:56Z | - |
dc.date.available | 2014-12-08T15:46:56Z | - |
dc.date.issued | 1999-02-01 | en_US |
dc.identifier.issn | 0916-8508 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/31550 | - |
dc.description.abstract | We suggest an MAC scheme which combines a hash function and an block cipher in order. We strengthen this scheme to prevent the problem of leaking the intermediate hash value between the hash function and the block cipher by additional random bits. The requirements to the used hash function are loosely. Security of the proposed scheme is heavily dependent on the underlying block cipher. This scheme is efficient on software implementation for processing long messages and has clear security properties. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | cryptography | en_US |
dc.subject | MAC | en_US |
dc.subject | one-way hash function | en_US |
dc.subject | block cipher | en_US |
dc.title | Construct message authentication code with one-way hash functions and block ciphers | en_US |
dc.type | Article | en_US |
dc.identifier.journal | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | en_US |
dc.citation.volume | E82A | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 390 | en_US |
dc.citation.epage | 393 | en_US |
dc.contributor.department | 資訊科學與工程研究所 | zh_TW |
dc.contributor.department | Institute of Computer Science and Engineering | en_US |
dc.identifier.wosnumber | WOS:000078845500029 | - |
dc.citation.woscount | 0 | - |
顯示於類別: | 期刊論文 |