How to Stretch Random Functions: The Security of Protected Counter Sums (1999)

View PDF

Download Links

by Daniel J. Bernstein
Venue:Journal of Cryptology
Citations:20 - 8 self

Active Bibliography

375 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
29 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
To be incorporated into author’s High-speed cryptography book. FLOATING-POINT ARITHMETIC AND MESSAGE AUTHENTICATION – Daniel J. Bernstein
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
496 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
519 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
827 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier