-
1
-
-
38149125785
-
The power of verification queries in message authentication and authenticated encryption
-
M. Bellare, O. Goldreich, and A. Mityagin. The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive: Report 2004/309.
-
Cryptology EPrint Archive: Report
, vol.2004
, Issue.309
-
-
Bellare, M.1
Goldreich, O.2
Mityagin, A.3
-
2
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Earlier version in Crypto '94
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences (JCSS), vol. 61, no. 3, pp. 362-399, 2000. Earlier version in Crypto '94.
-
(2000)
Journal of Computer and System Sciences (JCSS)
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
5644280926
-
-
Lecture Notes in Computer Science, Springer-Verlag
-
A. Berendschot, B. den Boer, J. Boly, A. Bosselaers, J. Brandt, D. Chaum, I. Damgård, M. Dichtl, W. Fumy, M. van der Ham, C. Jansen, P. Landrock, B. Preneel, G. Roelofsen, P. de Rooij, and J. Vandewalle. Final Report of Race Integrity Primitives. Lecture Notes in Computer Science, vol. 1007, Springer-Verlag, 1995
-
(1995)
Final Report of Race Integrity Primitives
, vol.1007
-
-
Berendschot, A.1
Den Boer, B.2
Boly, J.3
Bosselaers, A.4
Brandt, J.5
Chaum, D.6
Damgård, I.7
Dichtl, M.8
Fumy, W.9
Van Der Ham, M.10
Jansen, C.11
Landrock, P.12
Preneel, B.13
Roelofsen, G.14
De Rooij, P.15
Vandewalle, J.16
-
7
-
-
84974571314
-
CBC MACs for arbitrary-length messages: The three-key constructions
-
Lecture Notes in Computer Science M. Bellare ed., Springer-Verlag
-
J. Black and P. Rogaway. CBC MACs for arbitrary-length messages: the three-key constructions. Advances in Cryptology - CKYPTO '00, Lecture Notes in Computer Science Vol. 1880, M. Bellare ed., Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - CKYPTO '00
, vol.1880
-
-
Black, J.1
Rogaway, P.2
-
8
-
-
33745150242
-
-
Personal communication to K. Pietrzak
-
Y. Dodis. Personal communication to K. Pietrzak. 2004.
-
(2004)
-
-
Dodis, Y.1
-
9
-
-
35048839833
-
Randomness extraction and key derivation using the CBC, Cascade, and HMAC modes
-
Lecture Notes in Computer Science M. Franklin ed., Springer-Verlag
-
Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin. Randomness extraction and key derivation using the CBC, Cascade, and HMAC modes. Advances in Cryptology - CRYPTO '04, Lecture Notes in Computer Science Vol. 3152 M. Franklin ed., Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - CRYPTO '04
, vol.3152
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
11
-
-
84949450111
-
On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
-
Lecture Notes in Computer Science J. Daemen, V. Rijmen ed., Springer-Verlag
-
E. Jaulmes, A. Joux, and F. Valette. On the security of randomized CBC-MAC beyond the birthday paradox limit: a new construction. Fast Software Encryption '02, Lecture Notes in Computer Science Vol. 2365 J. Daemen, V. Rijmen ed., Springer-Verlag, 2002.
-
(2002)
Fast Software Encryption '02
, vol.2365
-
-
Jaulmes, E.1
Joux, A.2
Valette, F.3
-
12
-
-
0037614498
-
How to protect des against exhaustive key search (an analysis of DESX)
-
Earlier version in Crypto '96.
-
J. Kilian and P. Rogaway. How to protect DES against exhaustive key search (an analysis of DESX). Journal of Cryptology, vol. 14, no. 1, pp. 17-35, 2001. Earlier version in Crypto '96.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
13
-
-
84947240143
-
Indistinguishability of random systems
-
Lecture Notes in Computer Science L. Knudsen ed., Springer-Verlag
-
U. Maurer. Indistinguishability of random systems. Advances in Cryptology - EUROCRYPT '02, Lecture Notes in Computer Science Vol. 2332, L. Knudsen ed., Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - EUROCRYPT '02
, vol.2332
-
-
Maurer, U.1
-
15
-
-
0004775324
-
CBC MAC for real-time data sources
-
E. Petrank and C. Rackoff. CBC MAC for real-time data sources. Journal of Cryptology, vol. 13, no. 3, pp. 315-338, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 315-338
-
-
Petrank, E.1
Rackoff, C.2
-
16
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint report 2004/332, 2004.
-
(2004)
Cryptology ePrint Report
, vol.2004
, Issue.332
-
-
Shoup, V.1
-
17
-
-
17444394973
-
Decorrelation over infinite domains: The encrypted CBC-MAC case
-
S. Vaudenay. Decorrelation over infinite domains: the encrypted CBC-MAC case. Communications in Information and Systems (CIS), vol. 1, pp. 75-85, 2001.
-
(2001)
Communications in Information and Systems (CIS)
, vol.1
, pp. 75-85
-
-
Vaudenay, S.1
|