Pseudorandom functions revisited: The cascade construction and its concrete security (1996)

by Mihir Bellare , Ran Canetti , Hugo Krawczyk
Venue:Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE
Citations:92 - 20 self

Active Bibliography

Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security – Ran Canettiy, Hugo Krawczykz - 1996
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
13 On the power of the randomized iterate – Iftach Haitner, Danny Harnik, Omer Reingold - 2006
Hardness Preserving Reductions via Cuckoo Hashing – Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor - 2012
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
19 From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs – Moni Naor, Omer Reingold - 1998
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996