Active Bibliography

46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
is the full version. It is available from www.cs.ucdavis.edu/~rogaway/umac/ UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
1341 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
327 HMAC: Keyed-Hashing for Message Authentication – H. Krawczyk, M. Bellare, R. Canetti - 1997
468 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
744 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
1907 RTP: A Transport Protocol for Real-Time Applications – H. Schulzrinne/s. Casner