Decorrelation over Infinite Domains: the Encrypted CBC-MAC Case (2000)

Cached

Download Links

by Serge Vaudenay
Citations:6 - 1 self

Documents Related by Co-Citation

44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
58 A Block-Cipher Mode of Operation for Parallelizable Message Authentication – John Black, Phillip Rogaway - 2002
65 CBC MACs for arbitrary-length messages: The three-key constructions – John Black, Phillip Rogaway - 2000
136 OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption – Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz - 2001
38 Indistinguishability of Random Systems – Ueli Maurer - 2002
5 A Simple and Unified Method of Proving Indistinguishability (2006 – M Nandi - 2006
34 Decorrelation: a theory for block cipher security – Serge Vaudenay - 2003
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
88 How to protect DES against exhaustive key search – Joe Kilian, Phillip Rogaway - 1996
27 On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction – Éliane Jaulmes, Antoine Joux, Frédéric Valette - 2001
114 Sequences of Games: A Tool for Taming Complexity in Security Proofs – Victor Shoup - 2004
40 Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC – Phillip Rogaway - 2003
33 Authenticated-encryption with associated-data – Phillip Rogaway - 2002
2 TMAC: Two-Key CBC MAC, Cryptology ePrint Archive – K Kurosawa, T Iwata - 2003
2 OMAC: One-Key CBC MAC. Cryptology ePrint Archive – T Iwata, K Kurosawa
7 Final Report of RACE Integrity Primitives. LNCS 1007 – A Berendschot, B den Boer, J P Boly, A Bosselaers, J Brandt, D Chaum, I Damg˚ard, M Dichtl, W Fumy, M van der Ham, C J A Jansen, P Landrock, B Preneel, G Roelofsen, P de Rooij, J Vandewalle - 1995
16 Computer data authentication. Federal Information Processing Standards Publication 113 – FIPS - 1994
20 Information technology security techniques data integrity mechanism using a cryptographic check function employing 21 block cipher algorithm. International Organization for Standards – IsoIec - 1999