-
1
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. JCSS, vol. 61, no. 3, 2000.
-
(2000)
JCSS
, vol.61
, Issue.3
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
35248844642
-
-
Earlier version in Advances in Cryptology - CRYPTO '94, Springer-Verlag
-
Earlier version in Advances in Cryptology - CRYPTO '94, LNCS 839, pp. 341-358, Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.839
, pp. 341-358
-
-
-
3
-
-
5644280926
-
Final Report of RACE Integrity Primitives
-
Springer-Verlag
-
A. Berendschot, B. den Boer, J. P. Boly, A. Bosselaers, J. Brandt, D. Chaum, I. Damgård, M. Dichtl, W. Fumy, M. van der Ham, C. J. A. Jansen, P. Landrock, B. Preneel, G. Roelofsen, P. de Rooij, and J. Vandewalle. Final Report of RACE Integrity Primitives. LNCS 1007, Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.1007
-
-
Berendschot, A.1
Den Boer, B.2
Boly, J.P.3
Bosselaers, A.4
Brandt, J.5
Chaum, D.6
Damgård, I.7
Dichtl, M.8
Fumy, W.9
Van Der Ham, M.10
Jansen, C.J.A.11
Landrock, P.12
Preneel, B.13
Roelofsen, G.14
De Rooij, P.15
Vandewalle, J.16
-
4
-
-
84974571314
-
CBC MACs for arbitrary-length messages: The three key constructions
-
Advances in Cryptology - CRYPTO 2000, Springer-Verlag
-
J. Black and P. Rogaway. CBC MACs for arbitrary-length messages: The three key constructions. Advances in Cryptology - CRYPTO 2000, LNCS 1880, pp. 197-215, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 197-215
-
-
Black, J.1
Rogaway, P.2
-
6
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication
-
Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
-
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. Advances in Cryptology - EUROCRYPT 2002, LNCS 2332, pp. 384-397, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
7
-
-
35248828694
-
-
Federal Information Processing Standards Publication 113, U. S. Department of Commerce / National Bureau of Standards, National Technical Information Service, Springfield, Virginia
-
FIPS 113. Computer data authentication. Federal Information Processing Standards Publication 113, U. S. Department of Commerce / National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1994.
-
(1994)
FIPS 113. Computer Data Authentication
-
-
-
9
-
-
84949450111
-
On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
-
Fast Software Encryption, FSE 2002, Springer-Verlag, Full version is available at Cryptology ePrint Archive, Report 2001/074
-
É. Jaulmes, A. Joux, and F. Valette. On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction. Fast Software Encryption, FSE 2002, LNCS 2365, pp. 237-251, Springer-Verlag, 2002. Full version is available at Cryptology ePrint Archive, Report 2001/074, http://eprint.iacr.org/.
-
(2002)
LNCS
, vol.2365
, pp. 237-251
-
-
Jaulmes, É.1
Joux, A.2
Valette, F.3
-
10
-
-
26444587430
-
TMAC: Two-Key CBC MAC
-
Topics in Cryptology - CT-RSA 2003, Springer-Verlag, See also Cryptology ePrint Archive, Report 2002/092
-
K. Kurosawa and T. Iwata. TMAC: Two-Key CBC MAC. Topics in Cryptology - CT-RSA 2003, LNCS 2612, pp. 33-49, Springer-Verlag, 2003. See also Cryptology ePrint Archive, Report 2002/092, http://eprint.iacr.org/.
-
(2003)
LNCS
, vol.2612
, pp. 33-49
-
-
Kurosawa, K.1
Iwata, T.2
-
12
-
-
0004775324
-
CBC MAC for real-time data sources
-
Springer-Verlag
-
E. Petrank and C. Rackoff. CBC MAC for real-time data sources. J.Cryptology, vol. 13, no. 3, pp. 315-338, Springer-Verlag, 2000.
-
(2000)
J.Cryptology
, vol.13
, Issue.3
, pp. 315-338
-
-
Petrank, E.1
Rackoff, C.2
-
13
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
Advances in Cryptology - CRYPTO '95, Springer-Verlag
-
P. Rogaway. Bucket hashing and its application to fast message authentication. Advances in Cryptology - CRYPTO '95, LNCS 963, pp. 29-42, Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
14
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: a block-cipher mode of operation for efficient authenticated encryption. Proceedings of ACM Conference on Computer and Communications Security, ACM CCS 2001, ACM, 2001.
-
(2001)
Proceedings of ACM Conference on Computer and Communications Security, ACM CCS 2001
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
15
-
-
17444394973
-
Decorrelation over infinite domains: The encrypted CBC-MAC case
-
S. Vaudenay. Decorrelation over infinite domains: The encrypted CBC-MAC case. Communications in Information and Systems (CIS), vol. 1, pp. 75-85, 2001.
-
(2001)
Communications in Information and Systems (CIS)
, vol.1
, pp. 75-85
-
-
Vaudenay, S.1
-
16
-
-
35248858467
-
-
Earlier version in Selected Areas in Cryptography, SAC 2000, Springer-Verlag
-
Earlier version in Selected Areas in Cryptography, SAC 2000, LNCS 2012, pp. 57-71, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2012
, pp. 57-71
-
-
|