메뉴 건너뛰기




Volumn 3557, Issue , 2005, Pages 1-17

A new MAC construction ALRED and a specific instance ALPHA-MAC

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; FUNCTIONS; SECURITY OF DATA; TECHNICAL PRESENTATIONS;

EID: 26444575926     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11502760_1     Document Type: Conference Paper
Times cited : (44)

References (27)
  • 7
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • N. Koblitz, Ed., Springer-Verlag
    • Mihir Bellare, Ran Canetti, Hugo Krawczyk, "Keying hash functions for message authentication," Advances in Cryptology - Crypto 96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 1-15.
    • (1996) Advances in Cryptology - Crypto 96, LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
    • 84974571314 scopus 로고    scopus 로고
    • CBC MACs for arbitrary-length messages: The three-key constructions
    • M. Bellare, Ed., Springer-Verlag
    • John Black and Phillip Rogaway, "CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions," Advances in Cryptology - CRYPTO '00, LNCS 1880, M. Bellare, Ed., Springer-Verlag, 2000, pp. 197-215.
    • (2000) Advances in Cryptology - CRYPTO '00, LNCS , vol.1880 , pp. 197-215
    • Black, J.1    Rogaway, P.2
  • 10
    • 84949194881 scopus 로고    scopus 로고
    • New (Two-Track-)MAC based on the two trails of RIPEMD - Efficient, especially on short messages and for frequent key-changes
    • S. Vaudenay and Amr M. Youssef, Eds., Springer-Verlag
    • Bert den Boer, Bart Van Rompay, Bart Preneel and Joos Vandewalle., "New (Two-Track-)MAC based on the two trails of RIPEMD - Efficient, especially on short messages and for frequent key-changes," Selected Areas in Cryptography - SAC 2001, LNCS 2259, S. Vaudenay and Amr M. Youssef, Eds., Springer-Verlag, pp. 314-324.
    • Selected Areas in Cryptography - SAC 2001, LNCS , vol.2259 , pp. 314-324
    • Den Boer, B.1    Van Rompay, B.2    Preneel, B.3    Vandewalle, J.4
  • 11
  • 12
    • 0032655234 scopus 로고    scopus 로고
    • Attacks on MacDES MAC algorithm
    • Don Coppersmith and Chris J. Mitchell, "Attacks on MacDES MAC Algorithm," Electronics Letters, Vol. 35, 1999, pp. 1626-1627
    • (1999) Electronics Letters , vol.35 , pp. 1626-1627
    • Coppersmith, D.1    Mitchell, C.J.2
  • 13
    • 84974603539 scopus 로고    scopus 로고
    • Key recovery and forgery attacks on the MacDES MAC algorithm
    • M. Bellare, Ed., Springer Verlag
    • Don Coppersmith, Lars R. Knudsen and Chris J. Mitchell, "Key recovery and forgery attacks on the MacDES MAC algorithm," Advances in Cryptology - CRYPTO'2000 LNCS 1880, M. Bellare, Ed., Springer Verlag, 2000, pp. 184-196.
    • (2000) Advances in Cryptology - CRYPTO'2000 LNCS , vol.1880 , pp. 184-196
    • Coppersmith, D.1    Knudsen, L.R.2    Mitchell, C.J.3
  • 15
    • 84985785183 scopus 로고
    • A message authenticator algorithm suitable for a mainframe computer
    • G. R. Blakley and D. Chaum, Eds., Springer-Verlag
    • Donald W. Davies, "A message authenticator algorithm suitable for a mainframe computer," Advances in Cryptology - Proceedings of Crypto '84, LNCS 196, G. R. Blakley and D. Chaum, Eds., Springer-Verlag, 1985, pp. 393-400.
    • (1985) Advances in Cryptology - Proceedings of Crypto '84, LNCS , vol.196 , pp. 393-400
    • Davies, D.W.1
  • 16
    • 0242656059 scopus 로고    scopus 로고
    • OMAC: One-key CBC MAC
    • T. Johansson, Ed., Springer-Verlag
    • Tetsu Iwata and Kaoru Kurosawa, "OMAC: One-key CBC MAC," Fast Software Encryption 2003, LNCS 2887, T. Johansson, Ed., Springer-Verlag, 2003, pp. 129-153.
    • (2003) Fast Software Encryption 2003, LNCS , vol.2887 , pp. 129-153
    • Iwata, T.1    Kurosawa, K.2
  • 17
    • 84949450111 scopus 로고    scopus 로고
    • On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
    • J. Daemen and V. Rijmen, Eds., Springer-Verlag
    • E. Jaulmes, A. Joux and F. Valette, "On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction," Fast Software Encryption 2002, LNCS 2365, J. Daemen and V. Rijmen, Eds., Springer-Verlag, 2002, pp. 237-251.
    • (2002) Fast Software Encryption 2002, LNCS , vol.2365 , pp. 237-251
    • Jaulmes, E.1    Joux, A.2    Valette, F.3
  • 18
    • 0242656060 scopus 로고    scopus 로고
    • New attacks against standardized MACs
    • T. Johansson, Ed., Springer-Verlag
    • Antoine Joux, Guillaume Poupard and Jacques Stern, "New Attacks against Standardized MACs," Fast Software Encryption 2003, LNCS 2887, T. Johansson, Ed., Springer-Verlag, 2003, pp. 170-181.
    • (2003) Fast Software Encryption 2003, LNCS , vol.2887 , pp. 170-181
    • Joux, A.1    Poupard, G.2    Stern, J.3
  • 19
    • 0032047778 scopus 로고    scopus 로고
    • MacDES: A new MAC algorithm based on DES
    • Lars R. Knudsen and Bart Preneel, "MacDES: a new MAC algorithm based on DES," Electronics Letters, Vol. 34, No. 9, 1998, pp. 871-873.
    • (1998) Electronics Letters , vol.34 , Issue.9 , pp. 871-873
    • Knudsen, L.R.1    Preneel, B.2
  • 20
    • 84948949623 scopus 로고
    • Truncated and higher order differentials
    • Fast Software Encryption '94, B. Preneel, Ed., Springer-Verlag
    • Lars R. Knudsen, "Truncated and higher order differentials," Fast Software Encryption '94, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 196-211.
    • (1995) LNCS , vol.1008 , pp. 196-211
    • Knudsen, L.R.1
  • 22
    • 26444587430 scopus 로고    scopus 로고
    • TMAC: Two-key CBC MAC
    • M. Joye, Ed., Springer-Verlag
    • Kaoru Kurosawa and Tetsu Iwata, "TMAC: Two-Key CBC MAC," Topics in Cryptology: CT-RSA 2003, LNCS 2612, M. Joye, Ed., Springer-Verlag, 2003, pp. 265-273.
    • (2003) Topics in Cryptology: CT-RSA 2003, LNCS , vol.2612 , pp. 265-273
    • Kurosawa, K.1    Iwata, T.2
  • 24
    • 51549120471 scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • D. Coppersmith, Ed., Springer-Verlag
    • Bart Preneel and Paul C. van Oorschot, "MDx-MAC and building fast MACs from hash functions," Advances in Cryptology, Proceedings Crypto'95, LNCS 963, D. Coppersmith, Ed., Springer-Verlag, 1995, pp. 1-14.
    • (1995) Advances in Cryptology, Proceedings Crypto'95, LNCS , vol.963 , pp. 1-14
    • Preneel, B.1    Van Oorschot, P.C.2
  • 25
    • 0030216031 scopus 로고    scopus 로고
    • A key recovery attack on the ANSI X9.19 retail MAC
    • Bart Preneel and Paul C. van Oorschot, "A key recovery attack on the ANSI X9.19 retail MAC," Electronics Letters, Vol. 32, 1996, pp. 1568-1569.
    • (1996) Electronics Letters , vol.32 , pp. 1568-1569
    • Preneel, B.1    Van Oorschot, P.C.2
  • 26
    • 0032665874 scopus 로고    scopus 로고
    • On the security of iterated message authentication codes
    • Bart Preneel and Paul C. van Oorschot, "On the security of iterated Message Authentication Codes," IEEE Trans. on Information Theory, Vol. IT45, No. 1, 1999, pp. 188-199.
    • (1999) IEEE Trans. on Information Theory , vol.IT45 , Issue.1 , pp. 188-199
    • Preneel, B.1    Van Oorschot, P.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.