2020
DOI: 10.1016/j.procs.2020.03.224
|View full text |Cite
|
Sign up to set email alerts
|

KBC: Multiple Key Generation using Key Block Chaining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Authentication methods encompass various structures, one of which is the Cipher-based Message Authentication Code (CMAC). This technique relies on a strong cryptographic foundation, typically leveraging a block cipher like AES (Advanced Encryption Standard) operating in Cipher Block Chaining (CBC) mode [6], [7]. By utilizing a private secret key shared between the sender and recipient, CMAC processes fixed-size data blocks, potentially applying padding if the message size isn't a multiple of the block size.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication methods encompass various structures, one of which is the Cipher-based Message Authentication Code (CMAC). This technique relies on a strong cryptographic foundation, typically leveraging a block cipher like AES (Advanced Encryption Standard) operating in Cipher Block Chaining (CBC) mode [6], [7]. By utilizing a private secret key shared between the sender and recipient, CMAC processes fixed-size data blocks, potentially applying padding if the message size isn't a multiple of the block size.…”
Section: Related Workmentioning
confidence: 99%
“…Christidis and Devetsikiotis (2016) observed that the utilization of resources, information sharing, practices of automation and privacy in data transfer can be improved by blockchain-enabled IoT system. The stochasticity, transparency, functionality, reliability and hardiness of a system can be improved with security and robustness by using blockchain (Parjapati and Chaudhari, 2020;Sund et al, 2020). Further, observing the current trends of issues from literature on the importance of blockchain technology in different sectors, the authors of current research paper are trying to find answer to following research question in coming sections of current research paper:…”
Section: Rq1 What Are the Dominance Challenges Of Iiot Implementation...mentioning
confidence: 99%
“…The study provides evidence on the impact of political influence [25], data protection events [26], specific news and/or announcements [27], national policies [28], and other factors. The investigation through this angle is critical; likewise, the potential security perspectives on domains related to the monetary business sectors are urgent to keep up the integrity of the gathered data as well as their analysis [29,30]. In addition, it is important to understand the potential effects of several domains on financial market volatility.…”
Section: Related Workmentioning
confidence: 99%