-
1
-
-
84957098482
-
Constructing VIL-MACs from FILMACs: Message authentication under weakened assumptions
-
Proc. CRYPTO'99
-
J.H. An and M. Bellare, "Constructing VIL-MACs from FILMACs: Message authentication under weakened assumptions," Proc. CRYPTO'99, pp.252-269, Lect. Notes Comput. Sci. 1666, 1999.
-
(1999)
Proc. CRYPTO'99
, vol.1666
, pp. 252-269
-
-
An, J.H.1
Bellare, M.2
-
2
-
-
35048891868
-
Keying hash functions for message authentication
-
Proc. CRYPTO'96
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," Proc. CRYPTO'96, Lect. Notes Comput. Sci. 1109, pp.1-15, 1996.
-
(1996)
Lect. Notes Comput. Sci.
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," Proc. 37th IEEE Symposium on Foundations of Computer Science, pp.514-523, 1996.
-
(1996)
Proc. 37th IEEE Symposium on Foundations of Computer Science
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
Network Working Group RFC 2104
-
M. Bellare, R. Canetti, and H. Krawczyk, "HMAC: Keyed-hashing for message authentication," Network Working Group RFC 2104, Lect. Notes Comput. Sci. 1109, 1997.
-
(1997)
Lect. Notes Comput. Sci.
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," J. Comput. Syst. Sci., vol.61, no.3, pp.362-399, 2000.
-
(2000)
J. Comput. Syst. Sci.
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
6
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Proc. CRYPTO'97
-
M. Bellare and P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical," Proc. CRYPTO'97, pp.470-84, Lect. Notes Comput. Sci. 1294, 1997.
-
(1997)
Lect. Notes Comput. Sci.
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84981199109
-
A design principle for hash functions
-
Proc. CRYPTO'89
-
I. Damgård, "A design principle for hash functions," Proc. CRYPTO'89, pp.416-427, Lect. Notes Comput. Sci. 435, 1990.
-
(1990)
Lect. Notes Comput. Sci.
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
8
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Proc. EUROCRYPT'98
-
D.R. Simon, "Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?" Proc. EUROCRYPT'98, pp.334-345, Lect. Notes Comput. Sci. 1403, 1998.
-
(1998)
Lect. Notes Comput. Sci.
, vol.1403
, pp. 334-345
-
-
Simon, D.R.1
|