The chain sum primitive and its applications to MACs and stream ciphers (1998)

Cached

Download Links

by Mariusz Jakubowski , Ramarathnam Venkatesan
Venue:in (K. Nyberg, Ed) Advances in Cryptology | Proc. EUROCRYPT '98, Lecture Notes in Computer Science 1403
Citations:4 - 0 self

Active Bibliography

26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
3 Message Authentication Codes – John R. Black - 2000
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
8 Fast universal hashing with small keys and no preprocessing: the PolyR construction – Ted Krovetz, Phillip Rogaway - 2000
5 Luby-Racko backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz - 1998
22 Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz, Phillip Rogaway - 1998
1 New Constructions of Universal Hash Functions based on Function Sums – Khoongming Khoo, Swee-huay Heng
1 Key recycling in authentication – Christopher Portmann - 2012
Article Improving Classical Authentication over a Quantum Channel – Francisco M. Assis, Ar Stojanovic, Paulo Mateus, Yasser Omar - 2012
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
2 A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices – Palash Sarkar
79 HAIL: A HighAvailability and Integrity Layer for Cloud Storage – Kevin D. Bowers, Ari Juels, Alina Oprea - 2009
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
58 A Block-Cipher Mode of Operation for Parallelizable Message Authentication – John Black, Phillip Rogaway - 2002