Differential Attack on Message Authentication Codes (1994)

Cached

Download Links

by Kazuo Ohta , Mitsuru Matsui
Citations:4 - 0 self

Documents Related by Co-Citation

827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
12 A study of password security – Michael Luby, Charles Rackoff
52 Systematic Design of Two-Party Authentication Protocols – Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, Moti Yung - 1992
49 On the Cryptographic Applications of Random Functions – O Goldreich, S Goldwasser, S Micali - 1985
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993
18 private communication – A Shamir
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
7 Analysis of certain aspects of output feedback mode – Robert R Jueneman - 1982
30 Differential Cryptanalysis of Feal and N-Hash – Eli Biham, Adi Shamir - 1991
25 Results of an initial attempt to cryptanalyze the NBS data encryption standard – M E Hellman, R Merkle, R Schroeppel, L Washington, W Diffie, S Pohlig, P Schweitzer - 1976
30 Jan-Hendrik Evertse, Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors – David Chaum - 1986
493 Differential Cryptanalysis of DES-like Cryptosystems – Eli Biham, Adi Shamir - 1991
426 Linear Cryptanalysis Method of DES Cipher – M Matsui - 1994
5 Provably fast and secure digital signature algorithms based on secure hash functions – T Leighton, S Micali - 1993
1 Fully parallelizable message authentication – M Bellare, R Gu' erin, P Rogaway - 1994
819 The MD5 message-digest algorithm – R Rivest - 1992
725 Pseudo-Random Generation from One-Way Functions – Johan HÃ¥stad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988
311 Efficient Identification and Signature for Smart Cards – C Schnorr - 1989