How to Stretch Random Functions: The Security of Protected Counter Sums (1999)

Cached

Download Links

by Daniel J. Bernstein
Venue:Journal of Cryptology
Citations:19 - 7 self

Documents Related by Co-Citation

193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch GuĂ©rin, Phillip Rogaway - 1995
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
331 New Hash Functions and Their Use in Authentication and Set Equality – M N Wegman, J L Carter - 1981
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
58 Codes which detect deception – Edgar N Gilbert, F Jessie MacWilliams, Neil J A Sloane - 1974
59 Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes – Virgil D. Gligor, Pompiliu Donescu - 2001
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
35 On computationally secure authentication tags requiring short secret shared keys.InD.Chaum,R.L.Rivest,andA.T.Sherman – G Brassard - 1983
1172 Probabilistic encryption – S Goldwasser, S Micali - 1984
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995