Skip Abstract Section
Abstract
This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary data.
Cited By
- Huang Z, Lai J, Chen W, Au M, Peng Z and Li J (2019). Simulation-based selective opening security for receivers under chosen-ciphertext attacks, Designs, Codes and Cryptography, 87:6, (1345-1371), Online publication date: 1-Jun-2019.
- Bella G, Biondi P, Costantino G and Matteucci I TOUCAN Proceedings of the ACM Workshop on Automotive Cybersecurity, (3-8)
- Koh W and Chuah C On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (146-151)
- Heuer F and Poettering B Selective Opening Security from Simulatable Data Encapsulation Proceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 10032, (248-277)
- Hölzl M, Asnake E, Mayrhofer R and Roland M Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, (147-156)
- Han K, Potluri S and Shin K On authentication in a connected vehicle Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems, (160-169)
- Fleischmann E, Forler C and Lucks S McOE Proceedings of the 19th international conference on Fast Software Encryption, (196-215)
- Drimer S, Güneysu T and Paar C (2010). DSPs, BRAMs, and a Pinch of Logic, ACM Transactions on Reconfigurable Technology and Systems (TRETS), 3:1, (1-27), Online publication date: 1-Jan-2010.
- Hoepman J and Joosten R Practical schemes for privacy and security enhanced RFID Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (138-153)
- Wang P, Feng D, Wu W and Zhang L On the Unprovable Security of 2-Key XCBC Proceedings of the 13th Australasian conference on Information Security and Privacy, (230-238)
- Hämäläinen P, Hännikäinen M, Hämäläinen T, Soininen R and Rautee R (2006). Design and implementation of real-time betting system with offline terminals, Electronic Commerce Research and Applications, 5:2, (170-188), Online publication date: 1-Jul-2006.
- Okeya K and Iwata T Side channel attacks on message authentication codes Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks, (205-217)
- Mouha N and Luykx A Multi-key Security: The Even-Mansour Construction Revisited Advances in Cryptology -- CRYPTO 2015, (209-223)
Recommendations
Probably Secure Efficient Anonymous Credential Scheme
This article describes how after the concept of anonymous credential systems was introduced in 1985, a number of similar systems have been proposed. However, these systems use zero-knowledge protocols to authenticate users, resulting in inefficient ...