{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T23:37:54Z","timestamp":1772667474933,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)","award":["390621612"],"award-info":[{"award-number":["390621612"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528554","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"201-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["BP-MAC: Fast Authentication for Short Messages"],"prefix":"10.1145","author":[{"given":"Eric","family":"Wagner","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE &amp; RWTH Aachen University, Wachtberg, Germany"}]},{"given":"Martin","family":"Serror","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University &amp; Fraunhofer FKIE, Aachen, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"RWTH Aachen University &amp; Fraunhofer FKIE, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. ISO\/IEC 9797--1:2011 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher.  2011. ISO\/IEC 9797--1:2011 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ralph Ankele et al. 2018. MergeMAC: a MAC for authentication with strict time constraints and limited bandwidth. In ACNS.  Ralph Ankele et al. 2018. MergeMAC: a MAC for authentication with strict time constraints and limited bandwidth. In ACNS.","DOI":"10.1007\/978-3-319-93387-0_20"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Frederik Armknecht et al. 2020. ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. In ACM CCS.  Frederik Armknecht et al. 2020. ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. In ACM CCS.","DOI":"10.1145\/3372297.3423349"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jean-Philippe Aumasson and Daniel J Bernstein. 2012. SipHash: a fast short-input PRF. In Indocrypt.  Jean-Philippe Aumasson and Daniel J Bernstein. 2012. SipHash: a fast short-input PRF. In Indocrypt.","DOI":"10.1007\/978-3-642-34931-7_28"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE Communications Surveys & Tutorials","volume":"18","author":"Amira","year":"2016","unstructured":"Amira Barki et al. 2016. M2M Security: Challenges and Solutions . IEEE Communications Surveys & Tutorials , Vol. 18 , 2 ( 2016 ). Amira Barki et al. 2016. M2M Security: Challenges and Solutions. IEEE Communications Surveys & Tutorials, Vol. 18, 2 (2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Daniel J Bernstein. 2005. The Poly1305-AES message-authentication code. In FSE.  Daniel J Bernstein. 2005. The Poly1305-AES message-authentication code. In FSE.","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"John Black and Phillip Rogaway. 2002. A block-cipher mode of operation for parallelizable message authentication. In Eurocrypt.  John Black and Phillip Rogaway. 2002. A block-cipher mode of operation for parallelizable message authentication. In Eurocrypt.","DOI":"10.1007\/3-540-46035-7_25"},{"key":"e_1_3_2_1_8_1","unstructured":"Dan Boneh and Victor Shoup. 2020. A graduate course in applied cryptography.  Dan Boneh and Victor Shoup. 2020. A graduate course in applied cryptography."},{"key":"e_1_3_2_1_9_1","article-title":"Universal Classes of Hash Functions","volume":"18","author":"Lawrence Carter J","year":"1979","unstructured":"J Lawrence Carter and Mark N Wegman . 1979 . Universal Classes of Hash Functions . Journal of computer and system sciences , Vol. 18 , 2 (1979). J Lawrence Carter and Mark N Wegman. 1979. Universal Classes of Hash Functions. Journal of computer and system sciences, Vol. 18, 2 (1979).","journal-title":"Journal of computer and system sciences"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Andreas Frotzscher et al. 2014. Requirements and current solutions of wireless communication in industrial automation. In ICC.  Andreas Frotzscher et al. 2014. Requirements and current solutions of wireless communication in industrial automation. In ICC.","DOI":"10.1109\/ICCW.2014.6881174"},{"key":"e_1_3_2_1_11_1","volume-title":"Introduction to Industrial Control Networks","author":"Galloway Brendan","year":"2012","unstructured":"Brendan Galloway and Gerhard P Hancke . 2012. Introduction to Industrial Control Networks . IEEE Communications surveys & tutorials, Vol. 15 , 2 ( 2012 ). Brendan Galloway and Gerhard P Hancke. 2012. Introduction to Industrial Control Networks. IEEE Communications surveys & tutorials, Vol. 15, 2 (2012)."},{"key":"e_1_3_2_1_12_1","volume-title":"JCST","volume":"29","author":"Zheng","year":"2014","unstructured":"Zheng Gong et al. 2014. Tulp: A family of lightweight message authentication codes for body sensor networks . JCST , Vol. 29 , 1 ( 2014 ). Zheng Gong et al. 2014. Tulp: A family of lightweight message authentication codes for body sensor networks. JCST, Vol. 29, 1 (2014)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jens Hiller et al. 2018. Secure low latency communication for constrained industrial iot scenarios. In LCN.  Jens Hiller et al. 2018. Secure low latency communication for constrained industrial iot scenarios. In LCN.","DOI":"10.1109\/LCN.2018.8638027"},{"key":"e_1_3_2_1_14_1","unstructured":"Ted Krovetz. 2006. Message authentication on 64-bit architectures. In SAC.  Ted Krovetz. 2006. Message authentication on 64-bit architectures. In SAC."},{"key":"e_1_3_2_1_15_1","volume-title":"UMAC: Message authentication code using universal hashing. RFC 4418.","author":"Ted Krovetz","year":"2006","unstructured":"Ted Krovetz et al. 2006 . UMAC: Message authentication code using universal hashing. RFC 4418. Ted Krovetz et al. 2006. UMAC: Message authentication code using universal hashing. RFC 4418."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"He Li et al. 2020. Cumulative Message Authentication Codes for Resource-Constrained Networks. In CNS.  He Li et al. 2020. Cumulative Message Authentication Codes for Resource-Constrained Networks. In CNS.","DOI":"10.1109\/CNS48642.2020.9162217"},{"key":"e_1_3_2_1_17_1","article-title":"Cumulative Message Authentication Codes for Resource-Constrained IoT Networks","volume":"8","author":"He Li","year":"2021","unstructured":"He Li et al. 2021 . Cumulative Message Authentication Codes for Resource-Constrained IoT Networks . IEEE Internet of Things Journal , Vol. 8 , 15 (2021). He Li et al. 2021. Cumulative Message Authentication Codes for Resource-Constrained IoT Networks. IEEE Internet of Things Journal, Vol. 8, 15 (2021).","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_18_1","volume-title":"Ultra High Performance Wireless Control for Critical Applications: Challenges and Directions. IEEE TII","volume":"13","author":"Michele","year":"2017","unstructured":"Michele Luvisotto et al. 2017 . Ultra High Performance Wireless Control for Critical Applications: Challenges and Directions. IEEE TII , Vol. 13 , 3 ( 2017 ). Michele Luvisotto et al. 2017. Ultra High Performance Wireless Control for Critical Applications: Challenges and Directions. IEEE TII, Vol. 13, 3 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Atul Luykx et al. 2016. A MAC mode for lightweight block ciphers. In FSE.  Atul Luykx et al. 2016. A MAC mode for lightweight block ciphers. In FSE.","DOI":"10.1007\/978-3-662-52993-5_3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0025-y"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Nicky Mouha et al. 2014. Chaskey: an efficient MAC algorithm for 32-bit microcontrollers. In SAC.  Nicky Mouha et al. 2014. Chaskey: an efficient MAC algorithm for 32-bit microcontrollers. In SAC.","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE Communications Surveys & Tutorials","volume":"20","author":"Mohsin","year":"2018","unstructured":"Mohsin Raza et al. 2018. A Critical Analysis of Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks . IEEE Communications Surveys & Tutorials , Vol. 20 , 1 ( 2018 ). Mohsin Raza et al. 2018. A Critical Analysis of Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, Vol. 20, 1 (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"Vehicular Communications","volume":"9","author":"Jackson","year":"2017","unstructured":"Jackson Schmandt et al. 2017. Mini-MAC: Raising the bar for vehicular security with a lightweight message authentication protocol . Vehicular Communications , Vol. 9 ( 2017 ). Jackson Schmandt et al. 2017. Mini-MAC: Raising the bar for vehicular security with a lightweight message authentication protocol. Vehicular Communications, Vol. 9 (2017)."},{"key":"e_1_3_2_1_24_1","volume-title":"Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. In WiSec.","author":"Eric Wagner","year":"2022","unstructured":"Eric Wagner et al. 2022 . Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. In WiSec. Eric Wagner et al. 2022. Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. In WiSec."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_3_2_1_26_1","volume-title":"IEEE Micro","volume":"37","author":"Kaiyuan","year":"2017","unstructured":"Kaiyuan Yang et al. 2017. Hardware designs for security in ultra-low-power IoT systems: An overview and survey . IEEE Micro , Vol. 37 , 6 ( 2017 ). Kaiyuan Yang et al. 2017. Hardware designs for security in ultra-low-power IoT systems: An overview and survey. IEEE Micro, Vol. 37, 6 (2017)."}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":26,"alternative-id":["10.1145\/3507657.3528554","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528554","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}