Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions (1999)

by Jee Hea An , Mihir Bellare
Citations:26 - 3 self

Active Bibliography

92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security – Ran Canettiy, Hugo Krawczykz - 1996
5 Luby-Racko backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz - 1998
22 Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz, Phillip Rogaway - 1998
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
106 Towards realizing random oracles: Hash functions that hide all partial information – Ran Canetti - 1997
82 New proofs for NMAC and HMAC: Security without collision-resistance – Mihir Bellare - 2006
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
17 Building PRFs from PRPs – Chris Hall, David Wagner, John Kelsey, Bruce Schneier - 1998
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996