-
7
-
-
35048891868
-
Keying hash functions for message authentication
-
N. Koblitz, Ed., Springer-Verlag
-
Mihir Bellare, Ran Canetti, Hugo Krawczyk, "Keying hash functions for message authentication," Advances in Cryptology - Crypto 96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 1-15.
-
(1996)
Advances in Cryptology - Crypto 96, LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
M.J. Wiener, Ed., Springer-Verlag
-
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway, "UMAC: Fast and Secure Message Authentication," Advances in Cryptology - Crypto '99, LNCS 1666, M.J. Wiener, Ed., Springer-Verlag, 1999, pp. 216-233.
-
(1999)
Advances in Cryptology - Crypto '99, LNCS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
9
-
-
84974571314
-
CBC MACs for arbitrary-length messages: The three-key constructions
-
M. Bellare, Ed., Springer-Verlag
-
John Black and Phillip Rogaway, "CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions," Advances in Cryptology - CRYPTO '00, LNCS 1880, M. Bellare, Ed., Springer-Verlag, 2000, pp. 197-215.
-
(2000)
Advances in Cryptology - CRYPTO '00, LNCS
, vol.1880
, pp. 197-215
-
-
Black, J.1
Rogaway, P.2
-
10
-
-
84949194881
-
New (Two-Track-)MAC based on the two trails of RIPEMD - Efficient, especially on short messages and for frequent key-changes
-
S. Vaudenay and Amr M. Youssef, Eds., Springer-Verlag
-
Bert den Boer, Bart Van Rompay, Bart Preneel and Joos Vandewalle., "New (Two-Track-)MAC based on the two trails of RIPEMD - Efficient, especially on short messages and for frequent key-changes," Selected Areas in Cryptography - SAC 2001, LNCS 2259, S. Vaudenay and Amr M. Youssef, Eds., Springer-Verlag, pp. 314-324.
-
Selected Areas in Cryptography - SAC 2001, LNCS
, vol.2259
, pp. 314-324
-
-
Den Boer, B.1
Van Rompay, B.2
Preneel, B.3
Vandewalle, J.4
-
11
-
-
0013459688
-
New CBC-MAC forgery attacks
-
V. Varadharajan and Y. Mu, Eds., Springer-Verlag
-
K. Brincat and C. J. Mitchell, "New CBC-MAC forgery attacks," Information Security and Privacy, ACISP 2001, LNCS 2119, V. Varadharajan and Y. Mu, Eds., Springer-Verlag, 2001, pp. 3-14.
-
(2001)
Information Security and Privacy, ACISP 2001, LNCS
, vol.2119
, pp. 3-14
-
-
Brincat, K.1
Mitchell, C.J.2
-
12
-
-
0032655234
-
Attacks on MacDES MAC algorithm
-
Don Coppersmith and Chris J. Mitchell, "Attacks on MacDES MAC Algorithm," Electronics Letters, Vol. 35, 1999, pp. 1626-1627
-
(1999)
Electronics Letters
, vol.35
, pp. 1626-1627
-
-
Coppersmith, D.1
Mitchell, C.J.2
-
13
-
-
84974603539
-
Key recovery and forgery attacks on the MacDES MAC algorithm
-
M. Bellare, Ed., Springer Verlag
-
Don Coppersmith, Lars R. Knudsen and Chris J. Mitchell, "Key recovery and forgery attacks on the MacDES MAC algorithm," Advances in Cryptology - CRYPTO'2000 LNCS 1880, M. Bellare, Ed., Springer Verlag, 2000, pp. 184-196.
-
(2000)
Advances in Cryptology - CRYPTO'2000 LNCS
, vol.1880
, pp. 184-196
-
-
Coppersmith, D.1
Knudsen, L.R.2
Mitchell, C.J.3
-
15
-
-
84985785183
-
A message authenticator algorithm suitable for a mainframe computer
-
G. R. Blakley and D. Chaum, Eds., Springer-Verlag
-
Donald W. Davies, "A message authenticator algorithm suitable for a mainframe computer," Advances in Cryptology - Proceedings of Crypto '84, LNCS 196, G. R. Blakley and D. Chaum, Eds., Springer-Verlag, 1985, pp. 393-400.
-
(1985)
Advances in Cryptology - Proceedings of Crypto '84, LNCS
, vol.196
, pp. 393-400
-
-
Davies, D.W.1
-
16
-
-
0242656059
-
OMAC: One-key CBC MAC
-
T. Johansson, Ed., Springer-Verlag
-
Tetsu Iwata and Kaoru Kurosawa, "OMAC: One-key CBC MAC," Fast Software Encryption 2003, LNCS 2887, T. Johansson, Ed., Springer-Verlag, 2003, pp. 129-153.
-
(2003)
Fast Software Encryption 2003, LNCS
, vol.2887
, pp. 129-153
-
-
Iwata, T.1
Kurosawa, K.2
-
17
-
-
84949450111
-
On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
-
J. Daemen and V. Rijmen, Eds., Springer-Verlag
-
E. Jaulmes, A. Joux and F. Valette, "On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction," Fast Software Encryption 2002, LNCS 2365, J. Daemen and V. Rijmen, Eds., Springer-Verlag, 2002, pp. 237-251.
-
(2002)
Fast Software Encryption 2002, LNCS
, vol.2365
, pp. 237-251
-
-
Jaulmes, E.1
Joux, A.2
Valette, F.3
-
18
-
-
0242656060
-
New attacks against standardized MACs
-
T. Johansson, Ed., Springer-Verlag
-
Antoine Joux, Guillaume Poupard and Jacques Stern, "New Attacks against Standardized MACs," Fast Software Encryption 2003, LNCS 2887, T. Johansson, Ed., Springer-Verlag, 2003, pp. 170-181.
-
(2003)
Fast Software Encryption 2003, LNCS
, vol.2887
, pp. 170-181
-
-
Joux, A.1
Poupard, G.2
Stern, J.3
-
19
-
-
0032047778
-
MacDES: A new MAC algorithm based on DES
-
Lars R. Knudsen and Bart Preneel, "MacDES: a new MAC algorithm based on DES," Electronics Letters, Vol. 34, No. 9, 1998, pp. 871-873.
-
(1998)
Electronics Letters
, vol.34
, Issue.9
, pp. 871-873
-
-
Knudsen, L.R.1
Preneel, B.2
-
20
-
-
84948949623
-
Truncated and higher order differentials
-
Fast Software Encryption '94, B. Preneel, Ed., Springer-Verlag
-
Lars R. Knudsen, "Truncated and higher order differentials," Fast Software Encryption '94, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 196-211.
-
(1995)
LNCS
, vol.1008
, pp. 196-211
-
-
Knudsen, L.R.1
-
22
-
-
26444587430
-
TMAC: Two-key CBC MAC
-
M. Joye, Ed., Springer-Verlag
-
Kaoru Kurosawa and Tetsu Iwata, "TMAC: Two-Key CBC MAC," Topics in Cryptology: CT-RSA 2003, LNCS 2612, M. Joye, Ed., Springer-Verlag, 2003, pp. 265-273.
-
(2003)
Topics in Cryptology: CT-RSA 2003, LNCS
, vol.2612
, pp. 265-273
-
-
Kurosawa, K.1
Iwata, T.2
-
24
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
D. Coppersmith, Ed., Springer-Verlag
-
Bart Preneel and Paul C. van Oorschot, "MDx-MAC and building fast MACs from hash functions," Advances in Cryptology, Proceedings Crypto'95, LNCS 963, D. Coppersmith, Ed., Springer-Verlag, 1995, pp. 1-14.
-
(1995)
Advances in Cryptology, Proceedings Crypto'95, LNCS
, vol.963
, pp. 1-14
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
25
-
-
0030216031
-
A key recovery attack on the ANSI X9.19 retail MAC
-
Bart Preneel and Paul C. van Oorschot, "A key recovery attack on the ANSI X9.19 retail MAC," Electronics Letters, Vol. 32, 1996, pp. 1568-1569.
-
(1996)
Electronics Letters
, vol.32
, pp. 1568-1569
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
26
-
-
0032665874
-
On the security of iterated message authentication codes
-
Bart Preneel and Paul C. van Oorschot, "On the security of iterated Message Authentication Codes," IEEE Trans. on Information Theory, Vol. IT45, No. 1, 1999, pp. 188-199.
-
(1999)
IEEE Trans. on Information Theory
, vol.IT45
, Issue.1
, pp. 188-199
-
-
Preneel, B.1
Van Oorschot, P.C.2
|