Documents Related by Co-Citation

818 The MD5 Message-Digest Algorithm – R Rivest - 1992
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch GuĂ©rin, Phillip Rogaway - 1995
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
1225 The Byzantine Generals Problem – Leslie Lamport, Robert Shostak, Marshall Pease - 1982
329 New hash functions and their use in authentication and set equality – M Wegman, L Carter - 1981
829 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997
620 How to construct random functions – O Goldreich, S Goldwasser, S Micali - 1986
2445 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
383 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment – Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - 2002
791 Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial – Fred B. Schneider, Fred B. Schneider - 1990
15 National Standard–Financial institution message authentication (wholesale – American ANSIX9 9
190 Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", RFC 1421 – J. Linn, Curt Barker, Jim Bidzos, Matt Bishop, Danny Cohen, Charles Fox, Morrie Gasser, Russ Housley, Steve Kent, John Laws, Steve Lipner, Dan Nessett, Mike Padlipsky, Miles Smid, Steve Walker, Steve Wilbur - 1993
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
78 MDx-MAC and Building Fast MACs from Hash Functions – Bart Preneel, Paul C. Van Oorschot - 1995
84 Universal hash functions – L Carter, M Wegman - 1979
209 Security Proofs for Signature Schemes – David Pointcheval, Jacques Stern - 1996
2689 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
91 HMAC: keyed-hashing for message authentication," Request for Comments (Informational) 2104, Internet Engineering Task Force – H Krawczyk, M Bellare, R Canetti - 1997