How to Stretch Random Functions: The Security of Protected Counter Sums (1999)

Cached

Download Links

by Daniel J. Bernstein
Venue:Journal of Cryptology
Citations:19 - 7 self

Active Bibliography

28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
5 Luby-Racko backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz - 1998
22 Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz, Phillip Rogaway - 1998
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
3 Message Authentication Codes – John R. Black - 2000
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
10 On the Round Security of Symmetric-Key Cryptographic Primitives – Zulfikar Ramzan, Leonid Reyzin - 2000
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
17 Building PRFs from PRPs – Chris Hall, David Wagner, John Kelsey, Bruce Schneier - 1998
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
6 Concrete security characterizations of PRFs and PRPs: Reductions and applications – Anand Desai, Sara Miner - 2000
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
16 Does Encryption with Redundancy Provide Authenticity? – Jee Hea An, Mihir Bellare - 2001
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
18 From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs – Moni Naor, Omer Reingold - 1998