|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 18 keywords
|
|
|
Results
Found 33 publication records. Showing 30 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
145 | Tetsu Iwata, Kaoru Kurosawa |
On the Security of a New Variant of OMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 67-78, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
OMAC, provable security, Message authentication code, pseudorandom permutation |
94 | Tetsu Iwata, Kaoru Kurosawa |
OMAC: One-Key CBC MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 129-153, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
73 | Nils H. Hagge, Bernardo Wagner |
Implementation alternatives for the OMAC state machines using IEC 61499. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, September 15-18, 2008, Hamburg, Germany, pp. 215-220, 2008, IEEE, 1-4244-1505-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Mridul Nandi |
Fast and Secure CBC-Type MAC Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 375-393, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OMAC, padding rule, prf-security, CBC-MAC |
52 | Chris Culnane, Helen Treharne, Anthony T. S. Ho |
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 173-187, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Chris J. Mitchell |
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 155-167, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Tetsu Iwata, Kaoru Kurosawa |
Stronger Security Bounds for OMAC, TMAC, and XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 402-415, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Stefan Lucks |
Two-Pass Authenticated Encryption Faster Than Generic Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 284-298, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
associated data, OMAC, provable security, authenticated encryption |
51 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
The EAX Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 389-407, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC |
44 | Asim Evren Yantaç, Ali Vatansever, Tevfik Omaç, Ilker Kayi, Kemal Kuscu |
WorldBuilding and Mandala as a Tool for Co-Speculating on the Healthcare Domain in 2050. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindTrek ![In: Mindtrek '21: Academic Mindtrek 2021, Virtual EVent / Tampere, Finland, June 1-3, 2021, pp. 81-90, 2021, ACM, 978-1-4503-8514-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
44 | Zeki Omaç |
Fuzzy-logic-based robust speed control of switched reluctance motor for low and high speeds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Turkish J. Electr. Eng. Comput. Sci. ![In: Turkish J. Electr. Eng. Comput. Sci. 27(1), pp. 316-329, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
44 | Oguz Yakut, Haluk Eren, Mustafa Kaya, Eyyup Oksuztepe, M. Polat, Z. Omac, D. Bekler, Hasan Kürüm, Mehmet Celenk |
Dynamic risk modeling for safe car parking in climbing over urban curbs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCVE ![In: International Conference on Connected Vehicles and Expo, ICCVE 2012, Las Vegas, NV, USA, December 2-6, 2013, pp. 465-470, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Shaik Mahammad Rasool, Shah Aqueel Ahmed Abdul Gafoor |
OMAC: Optimal Medium Access Control Based Energy and QoS Compromise Techniques for Wireless Body Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 123(4), pp. 3223-3240, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi |
Towards Tight Security Bounds for OMAC, XCBC and TMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1234, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
31 | Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi |
Towards Tight Security Bounds for OMAC, XCBC and TMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I, pp. 348-378, 2022, Springer, 978-3-031-22962-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Anjali Gupta, Monica Bhutani, Abhishek Dixit, Brejesh Lall |
FD-OMAC: A Novel Full-Duplex Optical Media Access Control for IEEE 802.15.7. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 148894-148910, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Hatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi |
OMAC: Optimal migration algorithm for virtual CDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT ![In: 23rd International Conference on Telecommunications, ICT 2016, Thessaloniki, Greece, May 16-18, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1990-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Antonio Franco, Saeed Bastani, Emma Fitzgerald, Björn Landfeldt |
OMAC: An Opportunistic Medium Access Control Protocol for IEEE 802.11 Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM Workshops ![In: 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, pp. 1-7, 2015, IEEE, 978-1-4673-9526-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Siqi Chen 0001, Gerhard Weiss 0001 |
OMAC: A Discrete Wavelet Transformation Based Negotiation Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Novel Insights in Agent-based Complex Automated Negotiation ![In: Novel Insights in Agent-based Complex Automated Negotiation, pp. 187-196, 2014, Springer, 978-4-431-54757-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Emad Eldin Mohamed, Ezedin Barka |
OMAC: A new access control architecture for overlay multicast communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 24(6), pp. 761-775, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Mridul Nandi |
Improved security analysis for OMAC as a pseudorandom function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 3(2), pp. 133-148, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Mridul Nandi |
Improved security analysis of OMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 292, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
31 | Tetsu Iwata, Kaoru Kurosawa |
Stronger Security Bounds for OMAC, TMAC and XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 82, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
31 | Tetsu Iwata, Kaoru Kurosawa |
OMAC: One-Key CBC MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 180, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
31 | Kenneth N. McKay, David B. Kletter, Stephen C. Graves |
OMAC: An environment for modeling and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 72, pp. 241-264, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Miao Zhao, Ming Ma 0005, Yuanyuan Yang 0001 |
Opportunistic Medium Access Control in MIMO Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Managing Traffic Performance in Converged Networks, 20th International Teletraffic Congress, ITC20 2007, Ottawa, Canada, June 17-21, 2007, Proceedings, pp. 458-470, 2007, Springer, 978-3-540-72989-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Opportunistic medium access, Transmit beamforming, Receive beamforming, Multiuser diversity, Multiple-input multiple-output (MIMO), Wireless mesh networks (WMNs) |
21 | Mridul Nandi |
A Simple and Unified Method of Proving Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 317-334, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 205-217, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
21 | Pascal Urien, Mesmin Dandjinou |
The OpenEapSmartcard platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Net-Con ![In: Network Control and Engineering for QoS, Security and Mobility, IV, Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14-18, 2005, Proceedings, pp. 75-86, 2005, Springer, 978-0-387-49689-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
javacards, Security, WLAN, smartcards |
21 | Gustavo Arroyo, Claudio Ochoa, Josep Silva, Germán Vidal |
Towards CNC Programming Using Haskell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IBERAMIA ![In: Advances in Artificial Intelligence - IBERAMIA 2004, 9th Ibero-American Conference on AI, Puebla, Mexico, November 22-26, 2004, Proceedings, pp. 386-396, 2004, Springer, 3-540-23806-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #30 of 30 (100 per page; Change: )
|
|