An Update on the Analysis and Design of NMAC and HMAC Functions (2006)

Cached

Download Links

by Praveen Gauravaram , Shoichi Hirose , Suganya Annadurai

Active Bibliography

2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
83 New proofs for NMAC and HMAC: Security without collision-resistance – Mihir Bellare - 2006
7 Minding Your MAC Algorithms – Helena Handschuh , Bart Preneel - 2004
112 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
2 Collision Attacks on MD5 and SHA-1: Is this the “Sword of Damocles" for Electronic Commerce? – Praveen Gauravaram, Adrian McCullagh, Ed Dawson - 2006
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
Provable Security Support . . . – Mihir Bellare, Tadayoshi Kohno, Stefan Lucks, Niels Ferguson, Bruce Schneier, Doug Whiting, Jon Callas, Jesse Walker - 2009
5 Provable Security Support for the Skein Hash Family – Mihir Bellare, et al. - 2009
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security – Ran Canettiy, Hugo Krawczykz - 1996
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
ANOTHER LOOK AT SECURITY THEOREMS FOR 1-KEY NESTED MACS – Neal Koblitz, Alfred Menezes