The Security of Cipher Block Chaining (1994)

View PDF

Download Links

by M. Bellare , J. Kilian , P. Rogaway
Citations:168 - 28 self

Documents Related by Co-Citation

665 How to construct random functions – O Goldreich, S Goldwasser, S Micali - 1986
1241 Probabilistic encryption – S Goldwasser, S Micali - 1984
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
869 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
303 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
129 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch Guérin, Phillip Rogaway - 1995
875 The MD5 message-digest algorithm – R Rivest - 1992
756 Pseudo-Random Generation from One-Way Functions – Johan Håstad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988