A simple and practical hashing scheme based on Cyclic Redundancy Check (CRC) is presented. Similarly to previously proposed cryptographically secure CRCs, the presented one detects both, random and malicious, errors without increasing bandwidth. However, we use a product of irreducible polynomials instead of a single irreducible polynomial for generating the CRC. This is an advantage since smaller irreducible polynomials are easier to compute. The price we pay is that the probability that two different messages map into the same CRC increases. We provide a detailed quantitative analysis of the achieved security as a function of message and CRC sizes. The presented method seems to be particularly attractive for the authentication of short me...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a stan...
Cyclic Redundancy Checks (CRC) constitute an important class of hash functions for detecting changes...
Abstract. Low-cost resource-constrained devices can allocate very lim-ited resources for implementin...
Cyclic redundancy checks (CRCs) are commonly used to detect errors from noise in networks. They also...
Cost and efficiency concerns can force distributed embedded systems to use a single network for both...
International audienceHigh number of rounds is needed for the existing message authentication algori...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconne...
We present the eXtended Ciphertext Block Chaining (XCBC) schemes or modes of encryption that can det...
Cyclic Redundancy Codes (CRCs) provide a first line of defense against data corruption in many netwo...
Abstract. We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codeb...
The verification of the authenticity of a text document or a datafile is one of the main application...
We introduce the relationship between incremental cryptography and memory checkers. We present an in...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a stan...
Cyclic Redundancy Checks (CRC) constitute an important class of hash functions for detecting changes...
Abstract. Low-cost resource-constrained devices can allocate very lim-ited resources for implementin...
Cyclic redundancy checks (CRCs) are commonly used to detect errors from noise in networks. They also...
Cost and efficiency concerns can force distributed embedded systems to use a single network for both...
International audienceHigh number of rounds is needed for the existing message authentication algori...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconne...
We present the eXtended Ciphertext Block Chaining (XCBC) schemes or modes of encryption that can det...
Cyclic Redundancy Codes (CRCs) provide a first line of defense against data corruption in many netwo...
Abstract. We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codeb...
The verification of the authenticity of a text document or a datafile is one of the main application...
We introduce the relationship between incremental cryptography and memory checkers. We present an in...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a stan...
Cyclic Redundancy Checks (CRC) constitute an important class of hash functions for detecting changes...