메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 527-545

Improved security analyses for CBC MACs

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; FUNCTION EVALUATION; PROBABILITY; QUERY LANGUAGES; RANDOM PROCESSES;

EID: 33745136125     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (56)

References (18)
  • 1
    • 38149125785 scopus 로고    scopus 로고
    • The power of verification queries in message authentication and authenticated encryption
    • M. Bellare, O. Goldreich, and A. Mityagin. The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive: Report 2004/309.
    • Cryptology EPrint Archive: Report , vol.2004 , Issue.309
    • Bellare, M.1    Goldreich, O.2    Mityagin, A.3
  • 2
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Earlier version in Crypto '94
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences (JCSS), vol. 61, no. 3, pp. 362-399, 2000. Earlier version in Crypto '94.
    • (2000) Journal of Computer and System Sciences (JCSS) , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 7
    • 84974571314 scopus 로고    scopus 로고
    • CBC MACs for arbitrary-length messages: The three-key constructions
    • Lecture Notes in Computer Science M. Bellare ed., Springer-Verlag
    • J. Black and P. Rogaway. CBC MACs for arbitrary-length messages: the three-key constructions. Advances in Cryptology - CKYPTO '00, Lecture Notes in Computer Science Vol. 1880, M. Bellare ed., Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - CKYPTO '00 , vol.1880
    • Black, J.1    Rogaway, P.2
  • 8
    • 33745150242 scopus 로고    scopus 로고
    • Personal communication to K. Pietrzak
    • Y. Dodis. Personal communication to K. Pietrzak. 2004.
    • (2004)
    • Dodis, Y.1
  • 9
    • 35048839833 scopus 로고    scopus 로고
    • Randomness extraction and key derivation using the CBC, Cascade, and HMAC modes
    • Lecture Notes in Computer Science M. Franklin ed., Springer-Verlag
    • Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin. Randomness extraction and key derivation using the CBC, Cascade, and HMAC modes. Advances in Cryptology - CRYPTO '04, Lecture Notes in Computer Science Vol. 3152 M. Franklin ed., Springer-Verlag, 2004.
    • (2004) Advances in Cryptology - CRYPTO '04 , vol.3152
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 11
    • 84949450111 scopus 로고    scopus 로고
    • On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
    • Lecture Notes in Computer Science J. Daemen, V. Rijmen ed., Springer-Verlag
    • E. Jaulmes, A. Joux, and F. Valette. On the security of randomized CBC-MAC beyond the birthday paradox limit: a new construction. Fast Software Encryption '02, Lecture Notes in Computer Science Vol. 2365 J. Daemen, V. Rijmen ed., Springer-Verlag, 2002.
    • (2002) Fast Software Encryption '02 , vol.2365
    • Jaulmes, E.1    Joux, A.2    Valette, F.3
  • 12
    • 0037614498 scopus 로고    scopus 로고
    • How to protect des against exhaustive key search (an analysis of DESX)
    • Earlier version in Crypto '96.
    • J. Kilian and P. Rogaway. How to protect DES against exhaustive key search (an analysis of DESX). Journal of Cryptology, vol. 14, no. 1, pp. 17-35, 2001. Earlier version in Crypto '96.
    • (2001) Journal of Cryptology , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 13
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of random systems
    • Lecture Notes in Computer Science L. Knudsen ed., Springer-Verlag
    • U. Maurer. Indistinguishability of random systems. Advances in Cryptology - EUROCRYPT '02, Lecture Notes in Computer Science Vol. 2332, L. Knudsen ed., Springer-Verlag, 2002.
    • (2002) Advances in Cryptology - EUROCRYPT '02 , vol.2332
    • Maurer, U.1
  • 15
    • 0004775324 scopus 로고    scopus 로고
    • CBC MAC for real-time data sources
    • E. Petrank and C. Rackoff. CBC MAC for real-time data sources. Journal of Cryptology, vol. 13, no. 3, pp. 315-338, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 315-338
    • Petrank, E.1    Rackoff, C.2
  • 16
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint report 2004/332, 2004.
    • (2004) Cryptology ePrint Report , vol.2004 , Issue.332
    • Shoup, V.1
  • 17
    • 17444394973 scopus 로고    scopus 로고
    • Decorrelation over infinite domains: The encrypted CBC-MAC case
    • S. Vaudenay. Decorrelation over infinite domains: the encrypted CBC-MAC case. Communications in Information and Systems (CIS), vol. 1, pp. 75-85, 2001.
    • (2001) Communications in Information and Systems (CIS) , vol.1 , pp. 75-85
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.