XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions (1995)

by Mihir Bellare , Roch Guérin , Phillip Rogaway
Citations:122 - 19 self

Documents Related by Co-Citation

476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
119 LFSR-based hashing and authentication – H Krawczyk - 1994
106 Message Authentication with One-Way Hash Functions – Gene Tsudik - 1992
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
331 New Hash Functions and Their Use in Authentication and Set Equality – M N Wegman, J L Carter - 1981
819 The MD5 message-digest algorithm – R Rivest - 1992
328 The exact security of digital signatures: How to sign with RSA and Rabin – Mihir Bellare, Phillip Rogaway - 1996
463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
78 MDx-MAC and Building Fast MACs from Hash Functions – Bart Preneel, Paul C. Van Oorschot - 1995
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
8 A Design Principle for Hash Functions – DAMG ˚ARD, I - 1989
175 One way hash functions and DES – R Merkle - 1990
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
32 Message authentication with MD5 – B Kaliski, M Robshaw - 1995