0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

Efficient authentication and signing of multicast streams over lossy channels

Posted at

Efficient authentication and signing of multicast streams over lossy channels, Publisher: IEEE
A. Perrig; R. Canetti; J.D. Tygar; Dawn Song
https://ieeexplore.ieee.org/document/848446

Reference

  1. R. J. Anderson, F. Bergadano, B. Crispo, J.-H. Lee, C. Manifavas and R. M. Needham, "A new family of authentication protocols", Operating Systems Review, vol. 32, no. 4, pp. 9-20, October 1998.
  2. M. Bellare, J. Kilian and P. Rogaway, "The security of cipher block chaining", Advances in Cryptology - Crypto 94, vol. 839, pp. 341-358, 1994.
  3. M. Bellare and P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical", Advances in Cryptology - Crypto 97, vol. 1294, pp. 470-484, 1997.
  4. M. Bellare, R. Canetti and H. Krawczyk, "Message Authentication using Hash Functions — The HMAC Construction", RSA Laboratories CryptoBytes, vol. 2, no. 1, 1996.
  5. M. Bishop, "A Security Analysis of the NTP Protocol Version 2", Sixth Annual Computer Security Applications Conference, 1990-November.
  6. M. Borella, D. Swider, S. Uludag and G. Brewster, "Internet packet loss: Measurement and implications for end-to-end qos", International Conference on Parallel Processing, 1998-August.
  7. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions", Infocom 99, 1999.
  8. J. L. Carter and M. N. Wegman, "Universal classes of hash functions", JCSS No. 18, no. 18, pp. 143-154, 1979.
  9. D. D. Clark and D. L. Tennenhouse, "Architectural considerations for a new generation of protocols", Proceedings of the ACM symposium on Communications architectures and protocols SIGCOMM 90, pp. 200-208, 1990-September-26-28.
  10. Cryptix, [online] Available: http://www.cryptix.org.
  11. S. E. Deering, "Multicast Routing in Internetworks and Extended LANs", Proceedings of ACM SIGCOMM 88, 1988-August.
  12. T. Dierks and C. Allen, The TLS protocol version 1.0, January 1999.
  13. R. Gennaro and P. Rohatgi, How to Sign Digital Streams, 1997.
  14. O. Goldreich, Foundations of cryptography (fragments of a book), 1998, [online] Available: http://www.toc.lcs.mit. edu/~oded/frag.html.
  15. S. Goldwasser, S. Micali and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks", SIAM Journal of Computing, vol. 17, no. 2, pp. 281-308, April 1988.
  16. M. Handley, Private communication with Adrian Perrig, February 2000.
  17. Java web page, [online] Available: http://www.ibm.com/developer/java.
  18. Ipsec. IP Security Protocol, [online] Available: http://www.ietf.org/html.charters/ipsec—charter.html.
  19. M. G. Luby, Pseudorandomness and Cryptographic Applications, 1996.
  20. R. C. Merkle, "A certified digital signature", Advances in Cryptology - Crypto 89, vol. 435, pp. 218-238, 1989.
  21. R. Merkle, "Protocols for public key cryptosystems", 1980 IEEE Symposium on Security and Privacy, 1980.
  22. D. L. Mills, Network Time Protocol (Version 3) Specification Implementation and Analysis, March 1992.
  23. M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications", Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing (STOC 89), 1989.
  24. V. Paxson, "End-to-end internet packet dynamics", IEEE/ACM Transactions on Networking, vol. 7, no. 3, pp. 277-292, June 1999.
  25. M. O. Rabin, The information dispersal algorithm and its applications, 1990.
  26. R. L. Rivest, The MD5 message-digest algorithm, April 1992.
  27. R. L. Rivest, A. Shamir and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
  28. P. Rohatgi, "A compact and fast hybrid signature scheme for multicast packet authentication", 6th ACM Conference on Computer and Communications Security, 1999-November.
  29. Secure Multicast User Group (SMUG), [online] Available: http://www.ipmulticast.com/community/smug/.
  30. P. F. Syverson, S. G. Stubblebine and D. M. Goldschlag, "Unlinkable serial transactions", Financial Cryptography 97, vol. 1318, 1997.

Ref.

CAN FD and CAN XL onn arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735

CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d

CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0

0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?