Active Bibliography

46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
38 Practice-Oriented Provable-Security – Mihir Bellare - 1997
78 MDx-MAC and Building Fast MACs from Hash Functions – Bart Preneel, Paul C. Van Oorschot - 1995
3 Message Authentication Codes – John R. Black - 2000
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
8 Fast universal hashing with small keys and no preprocessing: the PolyR construction – Ted Krovetz, Phillip Rogaway - 2000
328 HMAC: Keyed-Hashing for Message Authentication – H. Krawczyk, M. Bellare, R. Canetti - 1997
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
10 On the Round Security of Symmetric-Key Cryptographic Primitives – Zulfikar Ramzan, Leonid Reyzin - 2000
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001