-
1
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, Keying hash functions for message authentication, Advances in Cryptology - Crypto '96 Proceedings, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, Berlin, 1996, pp. 1-15.
-
Advances in Cryptology - Crypto '96 Proceedings, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, Berlin, 1996, Pp. 1-15.
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
M. Bellare, R. Guérin, and P. Rogaway, XOR MACs: new methods for message authentication using finite pseudorandom functions, Advances in Cryptology - Crypto '95 Proceedings, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, Berlin, 1995, pp. 15-28.
-
Advances in Cryptology - Crypto '95 Proceedings, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, Berlin, 1995, Pp. 15-28.
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
3
-
-
84983089516
-
The security of cipher block chaining
-
M. Bellare, J. Kilian, and P. Rogaway, The security of cipher block chaining. Advances in Cryptology Crypto '94 Proceedings, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, Berlin, 1994, pp. 341-358. An updated version can be found in the personal URLs of the authors. See, for example, http://www.cs.ucdavis.edu/~rogaway/papersJ.
-
Advances in Cryptology Crypto '94 Proceedings, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, Berlin, 1994, Pp. 341-358. an Updated Version Can Be Found in the Personal URLs of the Authors. See, for Example, Http://www.cs.ucdavis.edu/~rogaway/papersJ.
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
4
-
-
84958663551
-
Collision resistant hashing: Towards making UOWHFs practical
-
M. Bellare and P. Rogaway, Collision resistant hashing: towards making UOWHFs practical, Advances in Cryptology - Crypto '97 Proceedings, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag, Berlin, 1997, pp. 471-484.
-
Advances in Cryptology - Crypto '97 Proceedings, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag, Berlin, 1997, Pp. 471-484.
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
33745995183
-
Integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation (RIPE-RACE 1040)
-
J.P. Boly, A. Bosselaers, J. Brandt, D. Chaum, I. Damgard, M. Dichtl, W. Fumy, M. van der Ham, C. J. A. Janscn, P. Landrock, B. Preneel, G. Roelofsen, P. de Rooij, and J. Vandewalle
-
A. Berendschot, B. den Boer, J.P. Boly, A. Bosselaers, J. Brandt, D. Chaum, I. Damgard, M. Dichtl, W. Fumy, M. van der Ham, C. J. A. Janscn, P. Landrock, B. Preneel, G. Roelofsen, P. de Rooij, and J. Vandewalle, Integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation (RIPE-RACE 1040), RIPE Integrity Primitives, Lecture Notes in Computer Science, Vol. 1007, Springer-Verlag, Berlin, 1995,226 pp.
-
RIPE Integrity Primitives, Lecture Notes in Computer Science, Vol. 1007, Springer-Verlag, Berlin, 1995,226 Pp.
-
-
Berendschot, A.1
Den Boer, B.2
-
6
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, Vol. 33, No. 4 (1986), pp. 210-217.
-
Journal of the ACM, Vol. 33, No. 4 (1986), Pp. 210-217.
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
7
-
-
0023985465
-
A digital signature scheme secure against adaptive chosenmessage attack
-
S. Goldwasser, S. Micali, and R. Rivest, A digital signature scheme secure against adaptive chosenmessage attack, SIAM Journal on Computing, Vol. 17, No. 2 (1988), pp. 281-308.
-
SIAM Journal on Computing, Vol. 17, No. 2 (1988), Pp. 281-308.
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
9
-
-
84991939136
-
LFSR-based hashing and authentication
-
H. Krawczyk, LFSR-based hashing and authentication. Advances in Cryptology - Crypto '94 Proceed-ings, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, Berlin, 1994, pp. 129-139.
-
Advances in Cryptology - Crypto '94 Proceed-ings, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, Berlin, 1994, Pp. 129-139.
-
-
Krawczyk, H.1
-
10
-
-
33745985433
-
-
ISO/IEC 9797, Data cryptographic techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1994.
-
ISO/IEC 9797, Data cryptographic techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1994.
-
-
-
-
11
-
-
0023984964
-
How o construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff, How (o construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, Vol. 17, No. 2 (1988), pp. 373-386.
-
SIAM Journal on Computing, Vol. 17, No. 2 (1988), Pp. 373-386.
-
-
Luby, M.1
Rackoff, C.2
-
13
-
-
0032665874
-
On the security of iterated message authentication codes
-
B. Preneel and P. van Oorschot, On the security of iterated message authentication codes, IEEE Transactions on Information Theory, vol. IT-45, No. 1 (1999), pp. 188-199.
-
IEEE Transactions on Information Theory, Vol. IT-45, No. 1 (1999), Pp. 188-199.
-
-
Preneel, B.1
Van Oorschot, P.2
-
16
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
V. Shoup, On fast and provably secure message authentication based on universal hashing. Advances in Cryptology - Crypto '96 Proceedings, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, Berlin, 1996, pp. 313-328.
-
Advances in Cryptology - Crypto '96 Proceedings, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, Berlin, 1996, Pp. 313-328.
-
-
Shoup, V.1
-
17
-
-
0000410707
-
Universal hashing and authentication codes
-
D. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography, Vol. 4, No 4 (1994), pp. 369-380.
-
Designs, Codes and Cryptography, Vol. 4, No 4 (1994), Pp. 369-380.
-
-
Stinson, D.1
-
18
-
-
0026973508
-
Message authentication with one-way hash functions
-
G. Tsudik, Message authentication with one-way hash functions, Proceedings oflnfocom 92, IEEE Press, New York, 1992, pp. 2055-2059.
-
Proceedings Oflnfocom 92, IEEE Press, New York, 1992, Pp. 2055-2059.
-
-
Tsudik, G.1
-
19
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. VVegman and L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 18, No. 2 (1979), pp. 143-154.
-
Journal of Computer and System Sciences, Vol. 18, No. 2 (1979), Pp. 143-154.
-
-
Vvegman, M.1
Carter, L.2
|