Efficient authentication and signing of multicast streams over lossy channels, Publisher: IEEE
A. Perrig; R. Canetti; J.D. Tygar; Dawn Song
https://ieeexplore.ieee.org/document/848446
Reference
- R. J. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas and R. M. Needham, "A new family of authentication protocols", Operating Systems Review, vol. 32, no. 4, pp. 9-20, October 1998.
- M. Bellare, J. Kilian and P. Rogaway, "The security of cipher block chaining", Advances in Cryptology - Crypto 94, vol. 839, pp. 341-358, 1994.
- M. Bellare and P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical", Advances in Cryptology - Crypto 97, vol. 1294, pp. 470-484, 1997.
- M. Bellare, R. Canetti and H. Krawczyk, "Message Authentication using Hash Functions — The HMAC Construction", RSA Laboratories CryptoBytes, vol. 2, no. 1, 1996.
- M. Bishop, "A Security Analysis of the NTP Protocol Version 2", Sixth Annual Computer Security Applications Conference, 1990-November.
- M. Borella, D. Swider, S. Uludag and G. Brewster, "Internet packet loss: Measurement and implications for end-to-end qos", International Conference on Parallel Processing, 1998-August.
- R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions", Infocom 99, 1999.
- J. L. Carter and M. N. Wegman, "Universal classes of hash functions", JCSS No. 18, no. 18, pp. 143-154, 1979.
- D. D. Clark and D. L. Tennenhouse, "Architectural considerations for a new generation of protocols", Proceedings of the ACM symposium on Communications architectures and protocols SIGCOMM 90, pp. 200-208, 1990-September-26-28.
- Cryptix, [online] Available: http://www.cryptix.org.
- S. E. Deering, "Multicast Routing in Internetworks and Extended LANs", Proceedings of ACM SIGCOMM 88, 1988-August.
- T. Dierks and C. Allen, The TLS protocol version 1.0, January 1999.
- R. Gennaro and P. Rohatgi, How to Sign Digital Streams, 1997.
- O. Goldreich, Foundations of cryptography (fragments of a book), 1998, [online] Available: http://www.toc.lcs.mit. edu/~oded/frag.html.
- S. Goldwasser, S. Micali and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks", SIAM Journal of Computing, vol. 17, no. 2, pp. 281-308, April 1988.
- M. Handley, Private communication with Adrian Perrig, February 2000.
- Java web page, [online] Available: http://www.ibm.com/developer/java.
- Ipsec. IP Security Protocol, [online] Available: http://www.ietf.org/html.charters/ipsec—charter.html.
- M. G. Luby, Pseudorandomness and Cryptographic Applications, 1996.
- R. C. Merkle, "A certified digital signature", Advances in Cryptology - Crypto 89, vol. 435, pp. 218-238, 1989.
- R. Merkle, "Protocols for public key cryptosystems", 1980 IEEE Symposium on Security and Privacy, 1980.
- D. L. Mills, Network Time Protocol (Version 3) Specification Implementation and Analysis, March 1992.
- M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications", Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing (STOC 89), 1989.
- V. Paxson, "End-to-end internet packet dynamics", IEEE/ACM Transactions on Networking, vol. 7, no. 3, pp. 277-292, June 1999.
- M. O. Rabin, The information dispersal algorithm and its applications, 1990.
- R. L. Rivest, The MD5 message-digest algorithm, April 1992.
- R. L. Rivest, A. Shamir and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
- P. Rohatgi, "A compact and fast hybrid signature scheme for multicast packet authentication", 6th ACM Conference on Computer and Communications Security, 1999-November.
- Secure Multicast User Group (SMUG), [online] Available: http://www.ipmulticast.com/community/smug/.
- P. F. Syverson, S. G. Stubblebine and D. M. Goldschlag, "Unlinkable serial transactions", Financial Cryptography 97, vol. 1318, 1997.
Ref.
CAN FD and CAN XL onn arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735
CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d
CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0