Cited By
View all- Seifermann SHeinrich RWerle DReussner R(2022)Detecting violations of access control and information flow policies in data flow diagramsJournal of Systems and Software10.1016/j.jss.2021.111138184:COnline publication date: 1-Feb-2022
The RMAC[6] is a variant of CBC-MAC, which resists birthday attacks and gives provably full security. The RMAC uses 2k-bit keys and the size of the RMAC is 2n, where n is the size of underlying block cipher. The TMAC[10] is the improved MAC scheme of ...
In this paper we discuss the security of PMAC, a provably secue and parallelizable MAC scheme proposed by Black and Rogaway, and Michell's TMAC variant, proposed to improve the security of TMAC. We show how to devise forgery attacks on PMAC and compare ...
We present practical approximation methods for computing and representing interprocedural aliases for a program written in a language that includes pointers, reference parameters, and recursion. We present the following contributions: (1) a framework ...
IEEE Computer Society
United States