Active Bibliography

2 ANOTHER LOOK AT HMAC – Neal Koblitz, Alfred Menezes
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
35 Randomness extraction and key derivation using the cbc, cascade and hmac modes – Yevgeniy Dodis, Rosario Gennaro, Hugo Krawczyk, Tal Rabin
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
10 On the Round Security of Symmetric-Key Cryptographic Primitives – Zulfikar Ramzan, Leonid Reyzin - 2000
22 Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions", Cryptology ePrint Report 2006/319 – Scott Contini, Yiqun Lisa Yin - 2006
27 On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction – Éliane Jaulmes, Antoine Joux, Frédéric Valette - 2001
223 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
3 A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security ⋆ – Ueli Maurer, Johan Sjödin
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
106 Towards realizing random oracles: Hash functions that hide all partial information – Ran Canetti - 1997
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
6 Concrete security characterizations of PRFs and PRPs: Reductions and applications – Anand Desai, Sara Miner - 2000
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
2 Collision Attacks on MD5 and SHA-1: Is this the “Sword of Damocles" for Electronic Commerce? – Praveen Gauravaram, Adrian McCullagh, Ed Dawson - 2006