A Block-Cipher Mode of Operation for Parallelizable Message Authentication (2002)

by John Black , Phillip Rogaway
Venue:Advances in Cryptology - EUROCRYPT 2002. Lecture Notes in Computer Science
Citations:58 - 7 self

Active Bibliography

3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
The Associated-Data Problem (How to cheaply authenticate unencrypted data when using an authenticated-encryption scheme) – Phillip Rogaway - 2001
3 Message Authentication Codes – John R. Black - 2000
16 Does Encryption with Redundancy Provide Authenticity? – Jee Hea An, Mihir Bellare - 2001
221 Authenticated encryption: Relations among notions and analysis of the generic composition paradigm – Mihir Bellare, Chanathip Namprempre - 2000
28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
19 Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm – Mihir Bellare - 2004
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
33 Authenticated-encryption with associated-data – Phillip Rogaway - 2002
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
31 CWC: A high-performance conventional authenticated encryption mode – Tadayoshi Kohno, John Viega, Doug Whiting - 2004
1 Proposal to NIST for a block-cipher mode of operation which simultaneously provides privacy and authenticity – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
137 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
10 Concealment and its applications to authenticated encryption – Yevgeniy Dodis, Jee Hea An - 2003
27 On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction – Éliane Jaulmes, Antoine Joux, Frédéric Valette - 2001
8 Fast universal hashing with small keys and no preprocessing: the PolyR construction – Ted Krovetz, Phillip Rogaway - 2000
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector – Palash Sarkar