Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security (1996)


Download Links

by Ran Canettiy , Hugo Krawczykz

Active Bibliography

92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
17 Building PRFs from PRPs – Chris Hall, David Wagner, John Kelsey, Bruce Schneier - 1998
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
10 On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis – Kouichi Sakurai, Yuliang Zheng - 1996
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract of ISAAC'96) – Kouichi Sakurai, Yuliang Zheng
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
13 On the power of the randomized iterate – Iftach Haitner, Danny Harnik, Omer Reingold - 2006
Hardness Preserving Reductions via Cuckoo Hashing – Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor - 2012
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999