L-collision attacks against randomized MACs (2000)

Cached

Download Links

by Michael Semanko
Venue:In CRYPTO
Citations:3 - 0 self

Active Bibliography

26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
27 On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction – Éliane Jaulmes, Antoine Joux, Frédéric Valette - 2001
Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security – Ran Canettiy, Hugo Krawczykz - 1996
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996
46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
7 Minding Your MAC Algorithms – Helena Handschuh , Bart Preneel - 2004
67 Authenticated Diffie-Hellman Key Agreement Protocols – Simon Blake-Wilson, Alfred Menezes - 1998
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
17 Building PRFs from PRPs – Chris Hall, David Wagner, John Kelsey, Bruce Schneier - 1998
3 Message Authentication Codes – John R. Black - 2000
2.3. PERFECT CONFIDENTIALITY OF MULTI-S01 CIPHER........................................................................... 6 – unknown authors - 2001
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006