메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 176-191

Badger - A fast and provably secure MAC

Author keywords

MAC; Pseudorandom generator; Tree; Universal hash

Indexed keywords

CONTROL SYSTEM ANALYSIS; FUNCTIONS; PROBABILITY; TREES (MATHEMATICS);

EID: 26444459873     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_13     Document Type: Conference Paper
Times cited : (16)

References (27)
  • 1
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • B. Kaliski, editor, Proc. Crypto '97, Springer
    • M. Bellare and P. Rogaway. Collision-resistant hashing: Towards making UOWHFs practical. In B. Kaliski, editor, Proc. Crypto '97, volume 1294 of LNCS, pages 470-484. Springer, 1997.
    • (1997) LNCS , vol.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84974696785 scopus 로고
    • On families of hash functions via geometric codes and concatenation
    • D. Stinson, editor, Proc. Crypto '93, Springer
    • J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets. On families of hash functions via geometric codes and concatenation. In D. Stinson, editor, Proc. Crypto '93, volume 773 of LNCS, pages 331-342. Springer, 1994.
    • (1994) LNCS , vol.773 , pp. 331-342
    • Bierbrauer, J.1    Johansson, T.2    Kabatianskii, G.3    Smeets, B.4
  • 5
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • M. Wiener, editor, Proc. Crypto '99. Springer
    • J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In M. Wiener, editor, Proc. Crypto '99, volume 1666 of LNCS, pages 216-232. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 216-232
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 7
    • 0242571722 scopus 로고    scopus 로고
    • Rabbit: A new high-performance stream cipher
    • T. Johansson, editor, Proc. Fast Software Encryption 2003. Springer
    • M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, and O. Scavenius. Rabbit: A new high-performance stream cipher. In T. Johansson, editor, Proc. Fast Software Encryption 2003, volume 2887 of LNCS, pages 307-329. Springer, 2003.
    • (2003) LNCS , vol.2887 , pp. 307-329
    • Boesgaard, M.1    Vesterager, M.2    Pedersen, T.3    Christiansen, J.4    Scavenius, O.5
  • 10
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • T. Dierks and C. Allen. The TLS protocol version 1.0, IETF RFC 2246. http://www.ietf.org/rfc.html, 1999.
    • (1999) IETF RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 11
    • 35248828702 scopus 로고    scopus 로고
    • A new version of the stream cipher SNOW
    • H. Heys and K. Nyberg, editors, Proc. SAC 2002, Springer
    • P. Ekdahl and T. Johansson. A new version of the stream cipher SNOW. In H. Heys and K. Nyberg, editors, Proc. SAC 2002, volume 2595 of LNCS, pages 47-61. Springer, 2002.
    • (2002) LNCS , vol.2595 , pp. 47-61
    • Ekdahl, P.1    Johansson, T.2
  • 12
    • 84942512232 scopus 로고    scopus 로고
    • Square Hash: Fast message authentication via optimized universal hash functions
    • M. Wiener, editor, Proc. Crypto '99, . Springer
    • M. Etzel, S. Patel, and Z. Ramzan. Square Hash: Fast message authentication via optimized universal hash functions. In M. Wiener, editor, Proc. Crypto '99, volume 1666 of LNCS, pages 234-251. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 234-251
    • Etzel, M.1    Patel, S.2    Ramzan, Z.3
  • 14
    • 0242571721 scopus 로고    scopus 로고
    • Helix: Fast encryption and authentication in a single cryptographic primitive
    • T. Johansson, editor, Proc. Fast Software Encryption 2003, Springer
    • N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno. Helix: Fast encryption and authentication in a single cryptographic primitive. In T. Johansson, editor, Proc. Fast Software Encryption 2003, volume 2887 of LNCS, pages 330-346. Springer, 2003.
    • (2003) LNCS , vol.2887 , pp. 330-346
    • Ferguson, N.1    Whiting, D.2    Schneier, B.3    Kelsey, J.4    Lucks, S.5    Kohno, T.6
  • 15
    • 84942522751 scopus 로고    scopus 로고
    • MMH: Software message authentication in the Gbit/second rates
    • E. Biham, editor, Proc. Fast Software Encryption '97. Springer
    • S. Halevi and H. Krawczyk. MMH: Software message authentication in the Gbit/second rates. In E. Biham, editor, Proc. Fast Software Encryption '97, volume 1267 of LNCS, pages 172-189. Springer, 1997.
    • (1997) LNCS , vol.1267 , pp. 172-189
    • Halevi, S.1    Krawczyk, H.2
  • 16
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Y. Desmedt, editor, Proc. Crypto '94, Berlin
    • H. Krawczyk. LFSR-based hashing and authentication. In Y. Desmedt, editor, Proc. Crypto '94, volume 839 of LNCS, pages 129-139, Berlin, 1994.
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 17
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication IETF RFC 2104. http://www.ietf.org/rfc.html, 1997.
    • (1997) IETF RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 19
    • 26444585952 scopus 로고    scopus 로고
    • T. Krovetz. UMAC performance. http://www.cs.ucdavis.edu/~rogaway/umac/ 2004/perf04.html, 2004.
    • (2004) UMAC Performance
    • Krovetz, T.1
  • 22
    • 84957663269 scopus 로고    scopus 로고
    • Software performance of universal hash functions
    • J. Stern, editor, Proc. Eurocrypt '99, Springer
    • W. Nevelsteen and B. Preneel. Software performance of universal hash functions. In J. Stern, editor, Proc. Eurocrypt '99, volume 1592 of LNCS, pages 24-41. Springer, 1999.
    • (1999) LNCS , vol.1592 , pp. 24-41
    • Nevelsteen, W.1    Preneel, B.2
  • 23
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • D. Coppersmith, editor, Proc. Crypto '95. Springer
    • P. Rogaway. Bucket hashing and its application to fast message authentication. In D. Coppersmith, editor, Proc. Crypto '95, volume 963 of LNCS, pages 29-42. Springer, 1995.
    • (1995) LNCS , vol.963 , pp. 29-42
    • Rogaway, P.1
  • 24
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • J. Feigenbaum, editor, Proc. Crypto '91, Springer
    • D. Stinson. Universal hashing and authentication codes. In J. Feigenbaum, editor, Proc. Crypto '91, volume 576 of LNCS, pages 74-85. Springer, 1992.
    • (1992) LNCS , vol.576 , pp. 74-85
    • Stinson, D.1
  • 25
    • 0000410707 scopus 로고
    • Universal hashing and message authentication codes
    • D. Stinson. Universal hashing and message authentication codes. Designs, Codes, and Cryptography, 4(4):369-380, 1994.
    • (1994) Designs, Codes, and Cryptography , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.1
  • 26
    • 0842305624 scopus 로고    scopus 로고
    • On the connection between universal hashing, combinatorial designs and error-correcting codes
    • D. Stinson. On the connection between universal hashing, combinatorial designs and error-correcting codes. In Proc. Congressus Numerantium 114, pages 7-27, 1996.
    • (1996) Proc. Congressus Numerantium , vol.114 , pp. 7-27
    • Stinson, D.1
  • 27
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegmann and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegmann, M.1    Carter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.