-
3
-
-
84983089516
-
The security of cipher block chaining
-
LNCS Springer-Verlag
-
M. Bellare, J. Kilian, P. Rogaway: The security of cipher block chaining. Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, p. 341-358.
-
(1994)
Proc. Crypto'94
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
4
-
-
84954417747
-
XOR MACs: New methods for message authentication using block ciphers
-
LNCS 963, Springer-Verlag
-
M. Bellare, R. Guérin, P. Rogaway: XOR MACs: new methods for message authentication using block ciphers. Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, p. 15-28.
-
(1995)
Proc. Crypto'95
, pp. 15-28
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
6
-
-
35048891868
-
Keying hash functions for message authentication
-
LNCS Springer-Verlag
-
M. Bellare, R. Canetti, H. Krawczyk: Keying hash functions for message authentication. Proc. Crypto'96, LNCS 1109, Springer-Verlag, 1996, p. 1-15. Full version: http:// www.research.ibm.com/security/.
-
(1996)
Proc. Crypto'96
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
0346810272
-
File authentication: A rule for constructing algorithms
-
October 12
-
H. Block: File authentication: A rule for constructing algorithms. SÄKdata Report, October 12, 1983.
-
(1983)
SÄKdata Report
-
-
Block, H.1
-
9
-
-
0004794568
-
The RIPEMD-160 cryptographic hash function
-
January
-
A. Bosselaers, H. Dobbertin, B. Preneel: The RIPEMD-160 cryptographic hash function. "Dr. Dobb's Journal", Vol. 22, No. 1, January 1997, p. 24-28.
-
(1997)
Dr. Dobb's Journal
, vol.22
, Issue.1
, pp. 24-28
-
-
Bosselaers, A.1
Dobbertin, H.2
Preneel, B.3
-
10
-
-
84985785183
-
A message authenticator algorithm suitable for a mainframe computer
-
LNCS Springer-Verlag
-
D. Davies: A message authenticator algorithm suitable for a mainframe computer. Proc. Crypto'84, LNCS 196, Springer-Verlag, 1985, p. 393-400.
-
(1985)
Proc. Crypto'84
, vol.196
, pp. 393-400
-
-
Davies, D.1
-
11
-
-
78649262413
-
The message authenticator algorithm (MAA) and its implementation
-
Feb.
-
D. Davies, D.O. Clayden: The message authenticator algorithm (MAA) and its implementation. NPL Report DITC 109/88, Feb. 1988.
-
(1988)
NPL Report DITC
, vol.109
, Issue.88
-
-
Davies, D.1
Clayden, D.O.2
-
14
-
-
0003508568
-
-
NBS, U.S. Department of Commerce, Washington D.C., Jan.
-
FIPS 46: Data encryption standard. NBS, U.S. Department of Commerce, Washington D.C., Jan. 1977.
-
(1977)
Data Encryption Standard
-
-
-
15
-
-
0003629991
-
-
NIST, US Department of Commerce, Washington D.C., April
-
FIPS 180-1: Secure hash standard. NIST, US Department of Commerce, Washington D.C., April 1995.
-
(1995)
Secure Hash Standard.
-
-
-
18
-
-
84878363139
-
On the relation between A-codes and codes correcting independent errors
-
LNCS 765, Springer-Verlag
-
T. Johansson, G. Kabatianskii, B. Smeets: On the relation between A-codes and codes correcting independent errors. Proc. Eurocrypt'93, LNCS 765, Springer-Verlag, 1994, p. 1-11.
-
(1994)
Proc. Eurocrypt'93
, pp. 1-11
-
-
Johansson, T.1
Kabatianskii, G.2
Smeets, B.3
-
19
-
-
84942522751
-
MMH: Software message authentication in the Gbit/s rates
-
LNCS, Springer-Verlag
-
S. Halevi, H. Krawczyk: MMH: software message authentication in the Gbit/s rates. Fast Software Encryption 1997, LNCS, 1267, Springer-Verlag, 1997, p. 172-189.
-
(1997)
Fast Software Encryption 1997
, vol.1267
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
20
-
-
0031546278
-
A new chosen-text attack on CBC-MAC
-
January
-
L. R. Knudsen: A new chosen-text attack on CBC-MAC. "Electronics Letters", Vol. 33, No. 1, January 1997, p. 48-49.
-
(1997)
Electronics Letters
, vol.33
, Issue.1
, pp. 48-49
-
-
Knudsen, L.R.1
-
21
-
-
84991939136
-
LFSR-based hashing and authentication
-
LNCS Springer-Verlag
-
H. Krawczyk: LFSR-based hashing and authentication. Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, p. 129-139.
-
(1994)
Proc. Crypto'94
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
22
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
LNCS Springer-Verlag
-
X. Lai, J. L. Massey, S. Murphy: Markov ciphers and differential cryptanalysis. Proc. Eurocrypt'91, LNCS 547, Springer-Verlag, 1991, p. 17-38.
-
(1991)
Proc. Eurocrypt'91
, vol.547
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
23
-
-
85028754650
-
The first experimental cryptanalysis of the Data Encryption Standard
-
LNCS Springer-Verlag
-
M. Matsui: The first experimental cryptanalysis of the Data Encryption Standard. Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, p. 1-11.
-
(1994)
Proc. Crypto'94
, vol.839
, pp. 1-11
-
-
Matsui, M.1
-
24
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
LNCS Springer-Verlag
-
B. Preneel, P. C. van Oorschot: MDx-MAC and building fast MACs from hash functions. Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, p. 1-14.
-
(1995)
Proc. Crypto'95
, vol.963
, pp. 1-14
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
25
-
-
85088200017
-
On the security of two MAC algorithms
-
LNCS Springer-Verlag
-
B. Preneel, P.C. van Oorschot: On the security of two MAC algorithms. Proc. Eurocrypt'96, LNCS 1070, Springer-Verlag, 1996, p. 19-32.
-
(1996)
Proc. Eurocrypt'96
, vol.1070
, pp. 19-32
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
26
-
-
0030216031
-
A key recovery attack on the ANSI X9.19 retail MAC
-
B. Preneel, P. C. van Oorschot: A key recovery attack on the ANSI X9.19 retail MAC. "Electronics Letters", Vol. 32, No. 17, 1996, p. 1568-1569.
-
(1996)
Electronics Letters
, vol.32
, Issue.17
, pp. 1568-1569
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
28
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
LNCS Springer-Verlag
-
P. Rogaway: Bucket hashing and its application to fast message authentication. Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, p. 29-42.
-
(1995)
Proc. Crypto'95
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
30
-
-
85016817758
-
Cryptographic significance of the carry for ciphers based on integer addition
-
LNCS Springer-Verlag
-
O. Staffelbach, W. Meier: Cryptographic significance of the carry for ciphers based on integer addition. Proc. Crypto'90, LNCS 537, Springer-Verlag, 1991, p. 601-615.
-
(1991)
Proc. Crypto'90
, vol.537
, pp. 601-615
-
-
Staffelbach, O.1
Meier, W.2
-
31
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman, J. L. Carter: New hash functions and their use in authentication and set equality. "J. Computer Sys. Sciences", Vol. 22, No. 3, 1981, p. 265-279.
-
(1981)
J. Computer Sys. Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
32
-
-
1842531284
-
Efficient des key search
-
School of Computer Science, Carleton University, Ottawa, Canada, May Presented at the rump session of Crypto'93
-
M. J. Wiener: Efficient DES key search. Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto'93.
-
(1994)
Technical Report TR-244
-
-
Wiener, M.J.1
|