74 Hits in 0.96 sec

MAC Reforgeability [chapter]

John Black, Martin Cochran
2009 Lecture Notes in Computer Science  
In this paper, we examine the notion of "reforgeability" for MACs, and motivate its utility in the context of {power, bandwidth, CPU}-constrained computing environments.  ...  Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage.  ...  requesting reforgeability resistant MACs [32] lends support to this.  ... 
doi:10.1007/978-3-642-03317-9_21 fatcat:yaomfcbybzfohh4hkalu7dufr4

Reforgeability of Authenticated Encryption Schemes [chapter]

Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2017 Lecture Notes in Computer Science  
Thus, besides the resistance of MACs to reforgeability, also the resistance of AE schemes is of high practical relevance.  ...  The term Reforgeability was first formally defined by Black and Cochran in 2009, where they examined common MACs regarding their security to this new measurement [13] .  ... 
doi:10.1007/978-3-319-59870-3_2 fatcat:6f2izpaeezd5rcbk476qjqskdi

Page 156 of Library Journal Vol. 50, Issue 4 [page]

1925 Library Journal  
<A new story of Louis Hémon’s, Blind Man’s Buff, translated by Arthur Richmond (Mac- millan, $2), has for its hero a young London dockman, who tries to understand life by various means, but whose search  ...  History and Sociology are represented } the following books: The Reforging of Russia by Edwin Ware Hullinger (947, Dutton, $3) the author of which was a United Press corre spondent in that country until  ... 

Page 288 of Social Studies Review Vol. 18, Issue 7 [page]

1927 Social Studies Review  
Reforging America. N. Y.: Scrib- ner. 397 pp. $3.00. Stryker, William S. The Battle of Monmouth. ton: Princeton Univ. Press. 303 pp. $4.50. Tardieu, André P. G. A. France and America.  ...  Y.: Mac- millan. 576 pp. (38 p. bibl.). $7.00. Carter, Howard. The tomb of Tut-Ankh-Amen. N. Y.: Doran. 408 pp. $5.00. DeClareuil, J. Rome, the law giver. N. Y.: Knopf. 420 ms was Vol. 2.  ... 

The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE [chapter]

Dmitry Khovratovich, Christian Rechberger
2014 Lecture Notes in Computer Science  
One can hence say that ALE, similarly to GCM, has high reforgeability [5] .  ...  A secure way to do it, known as Encrypt-then-MAC, is to produce a MAC on another key and couple it with the ciphertext.  ... 
doi:10.1007/978-3-662-43414-7_9 fatcat:wzaxvb3afjhphalqn4serzld7e

Relatório da avaliação sobre a defesa de dissertação de mestrado: "ideologia e prática da Educação Física escolar"

Maurício Roberto da Silva
1993 Motrivivência  
Jefferson Canfield, macs uma vez dirijo-me ao orientador Dr. Heimo Fensterseifer e a mestranda Profa.  ...  roleviands social da investi2agifto, chamando a atenglio para o fato de que a riedede des PeequIelle em Educacio Fisica apresantam am sous resultades conclus6es quo dlecemente serao socializedos", a reforge  ... 
doi:10.5007/28871 doaj:812299c005664cb8a51f5b0e3f19fb83 fatcat:hh4zc6ss5nbtxla5ozm2k4y7ca

Die Amerikaner proben den Ernstfall

Jürg Kürsener
Mit 133 C-141 Starlifter und 11 Riesentransportern C-5A Galaxy des Military Airlift Command (MAC) wurden die 12 000 Mann und 1100 t Material der zwei Brigaden der 1.  ...  Infanteriedivision zur ersten Reforger-Übung nach Deutschland. Im Herbst 1970 und 1971 folgten die Gefechts-Übungen Reforger II und III, wobei wiederum die zwei Brigaden des inzwischen zur 1.  ... 
doi:10.5169/seals-704568 fatcat:hha3atuy3ngedi7tyti7rgklpi

Page 42 of Mathematical Reviews Vol. 15, Issue Index [page]

Mathematical Reviews  
(English summary) [The ghost of modality] Logic See Reforging the great chain of being, 832:03010 Reforging the great chain of being %*Reforging the great chain of being. 83a:03010 secondary classifications  ...  J., (83401076) (Ehresmann, Charles) See Mac Lane, Saunders, (83b:01056) Englebretsen, George Do we need relative identity? (834:03032) Esenin-Vol'pin, A. S.  ... 

Books Received

1925 Journal of Political Economy  
The Reforg- ing of Russia. (New York: E. P. Dutton & Co. 1925.) Hunt, Edward E. Scientific Manage- ment Since Taylor. (New York: McGraw-Hill Book Co. 1924.) Ibanez, Vincente Blasco.  ...  (London: Mac- millan Co., Ltd. 1923.) Moriarty, W. D. Economics for Citi- zenship. (New York: Longmans, Green & Co. 1925.) Moulton, H. G., and Lewis, Cleona.  ... 
doi:10.1086/253734 fatcat:ova5sja4hjgvha45rlwvdxfoqm

Large Naval and Coast Defense Guns

G. H. Holden
1916 Scientific American  
It is again reheated, reforged and drawn on the breech end of ingot for 30 feet.  ...  The forging is then given a high a p neal to relieve forging strains, and when cool is mac�ined to 0.5 inch of blueprint dimensions to develop any seams 01' defects.  ... 
doi:10.1038/scientificamerican04151916-248supp fatcat:rawhkijqvveb7lkjimoy5bbkqy

Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT

Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár
2021 IACR Transactions on Symmetric Cryptology  
Tag Generation with CBC-MAC. The tag generation step (upper part of Figure 5) uses plain CBC-MAC to generate a 128-bit tag, which is then truncated to the desired tag length τ .  ...  However, it is necessary to integrate the reforgeability and the nvae security notions and investigate the corresponding relations among notions to fully analyze the impact of simultaneous tag variations  ... 
doi:10.46586/tosc.v2021.i2.446-468 fatcat:fmpwppdvdnbjhl4kqjprn64s24

Page 123 of The Journal of Presbyterian History Vol. 85, Issue 2 [page]

The Journal of Presbyterian History  
Blum, Reforging the White Republic: Race, Religion, and American Nationalism, 1865-1898 (Baton Rouge: Louisi- ana State University Press, 2005); Victor B.  ...  Fierce Discontent: The Rise and Fall of the Progressive Movement in America, 1870-1920 (New York: Free Press, 2003); William Allen White, A Puri- tan in Babylon: The Story of Calvin Coolidge (New York: Mac  ... 

Military Airlift Command : das Lufttransportwesen der USA

Volker Buchner
Übungen teil so u. a. auch an Reforger (Returne of Forces to Germany). 1978 wurden Panzer, Geschütze, Hubschrauber, Kampfflugzeuge, Kettenfahrzeuge, Lastwagen und Zugmaschinen sowie rund 750 Tonnen Ausrüstungen  ...  Im Krisenfall werden dem MAC 30 000 Reservisten zugeführt, die immer wieder ihre Reserveübungen beim MAC ableisten.  ... 
doi:10.5169/seals-705117 fatcat:nz5whe5q3bgn7cyglbstch6bxa

The Spirit of the Sword and Spear

Mark Pearce
2013 Cambridge Archaeological Journal  
The early twelfth-century Irish text Scéla Conchoboir maic Nessa (Tidings of Conchobor mac Nessa) contains a list of shields and swords that were kept in King Conchobor's house -these are identified by  ...  Norwegian and Icelandic) sagas: Sigurdur's Gramr was reforged from the pieces of his father Sigmund's sword by the smith, Regin (Völsunga saga, 15), and in the saga of Gísli Súrsson, the sword called Grásíða  ... 
doi:10.1017/s0959774313000048 fatcat:gwebekcf2fdt5bsvgmqlhypscm

Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms [chapter]

Helena Handschuh, Bart Preneel
Lecture Notes in Computer Science  
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions.  ...  Black and Cochran have analyzed in [10] what happens after a first collision is observed in the output of the MAC algorithm; they show that subsequent forgeries or reforgeability becomes easier than  ...  They propose a solution to these reforgeability attacks in the form of the WMAC construction [10] ; however, we will show in this paper that this construction does not offer any protection against most  ... 
doi:10.1007/978-3-540-85174-5_9 fatcat:qczw2lzkxrbghasuxbslgebdci
« Previous Showing results 1 — 15 out of 74 results