-
2
-
-
84983089516
-
The security of cipher block chaining
-
Y.G. Desmedt, editor. LNCS 839. Springer-Verlag, Berlin
-
M. Bellare, J. Kilian, and P. Rogaway. The security of cipher block chaining. In Y.G. Desmedt, editor, Advances in Cryptology - CRYPTO '94, pages 341-358. LNCS 839. Springer-Verlag, Berlin, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '94
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
3
-
-
84974603539
-
Key recovery and forgery attacks on the MacDES MAC algorithm
-
M. Bellare editor. LNCS 1880. Springer-Verlag, Berlin
-
D. Coppersmith, L.R. Knudsen, and C.J. Mitchell. Key recovery and forgery attacks on the MacDES MAC algorithm. In M. Bellare editor, Advances in Cryptology - CRYPTO 2000, pages 184-196. LNCS 1880. Springer-Verlag, Berlin, 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000
, pp. 184-196
-
-
Coppersmith, D.1
Knudsen, L.R.2
Mitchell, C.J.3
-
4
-
-
0032655234
-
Attacks on MacDES MAC algorithm
-
D. Coppersmith and C.J. Mitchell, Attacks on MacDES MAC algorithm. Electronics Letters, vol. 35, no. 19 (1999), pp. 1626-1627.
-
(1999)
Electronics Letters
, vol.35
, Issue.19
, pp. 1626-1627
-
-
Coppersmith, D.1
Mitchell, C.J.2
-
6
-
-
84949450111
-
On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
-
J. Daemen and V. Rijmen, editors. LNCS 2365. Springer-Verlag, Berlin
-
E. Jaulmes, A. Joux, and F. Valette. On the security of randomized CBC-MAC beyond the birthday paradox limit: a new construction. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, pages 237-251. LNCS 2365. Springer-Verlag, Berlin, 2002.
-
(2002)
Fast Software Encryption 2002
, pp. 237-251
-
-
Jaulmes, E.1
Joux, A.2
Valette, F.3
-
7
-
-
0242656060
-
New attacks against standardized MACs
-
T. Johansson, editor, LNCS 2887. Springer-Verlag, Berlin
-
A. Joux, G. Poupard and J. Stern. New attacks against standardized MACs. In T. Johansson, editor, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 2003, Revised Papers, pages 170-181. LNCS 2887. Springer-Verlag, Berlin, 2003.
-
(2003)
Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 2003, Revised Papers
, pp. 170-181
-
-
Joux, A.1
Poupard, G.2
Stern, J.3
-
8
-
-
67650338267
-
Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES
-
Neal Koblitz, editor. LNCS 1109. Springer-Verlag, Berlin
-
J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES. In Neal Koblitz, editor, Advances in Cryptology: CRYPTO '96, pages 237-251. LNCS 1109. Springer-Verlag, Berlin, 1996.
-
(1996)
Advances in Cryptology: CRYPTO '96
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
9
-
-
0242656062
-
An analysis of RMAC
-
T. Johansson, editor. LNCS 2887. Springer-Verlag, Berlin
-
L.R. Knudsen and T. Kohno. An analysis of RMAC. In T. Johansson, editor, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 2003, Revised Papers, pages 182-191. LNCS 2887. Springer-Verlag, Berlin, 2003.
-
(2003)
Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 2003, Revised Papers
, pp. 182-191
-
-
Knudsen, L.R.1
Kohno, T.2
-
10
-
-
0037722918
-
Analysis of 3gpp-MAC and two-key 3gpp-MAC
-
L.R. Knudsen, and C.J. Mitchell. Analysis of 3gpp-MAC and two-key 3gpp-MAC. Discrete App. Math., vol. 128, no. 1 (2003), pp. 181-191.
-
(2003)
Discrete App. Math.
, vol.128
, Issue.1
, pp. 181-191
-
-
Knudsen, L.R.1
Mitchell, C.J.2
-
11
-
-
0032047778
-
MacDES: A new MAC algorithm based on des
-
April
-
L.R. Knudsen and B. Preneel. MacDES: a new MAC algorithm based on DES. Electron. Lett., vol. 34, no. 9 (April 1998), pp. 871-873.
-
(1998)
Electron. Lett.
, vol.34
, Issue.9
, pp. 871-873
-
-
Knudsen, L.R.1
Preneel, B.2
-
12
-
-
84947904428
-
New block encryption algorithm MISTY
-
E. Biham, editor. LNCS 1267. Springer-Verlag, Berlin
-
M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pages 54-68. LNCS 1267. Springer-Verlag, Berlin, 1997.
-
(1997)
Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings
, pp. 54-68
-
-
Matsui, M.1
-
13
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
14
-
-
0037456425
-
Key recovery attack on ANSI retail MAC
-
C.J. Mitchell, Key recovery attack on ANSI retail MAC. Electron. Lett., vol. 39, no. 14 (2003), pp. 361-362.
-
(2003)
Electron. Lett.
, vol.39
, Issue.14
, pp. 361-362
-
-
Mitchell, C.J.1
-
18
-
-
0004775324
-
CBC MAC for real-time data sources
-
E. Petrank and C. Rackoff. CBC MAC for real-time data sources. J. Cryptology, vol. 13, no. 3 (2000), pp. 315-338.
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 315-338
-
-
Petrank, E.1
Rackoff, C.2
-
19
-
-
0030216031
-
A key recovery attack on the ANSI X9.19 retail MAC
-
B. Preneel and P.C. van Oorschot, A key recovery attack on the ANSI X9.19 retail MAC, Electron. Lett., vol. 32, no. 17 (1996), pp. 1568-1569.
-
(1996)
Electron. Lett.
, vol.32
, Issue.17
, pp. 1568-1569
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
20
-
-
0032665874
-
On the security of iterated message authentication codes
-
B. Preneel and P.C. van Oorschot. On the security of iterated message authentication codes. IEEE Trans. Inform. Theory, vol. 45, no. 1 (1999), 188-199.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, Issue.1
, pp. 188-199
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
22
-
-
0001797564
-
Payword and Micromint: Two simple micropayment schemes
-
R. Rivest and A. Shamir. Payword and Micromint: two simple micropayment schemes. Cryptobytes, vol. 2, no. 1(1996), pp. 7-11.
-
(1996)
Cryptobytes
, vol.2
, Issue.1
, pp. 7-11
-
-
Rivest, R.1
Shamir, A.2
|