-
1
-
-
35048891868
-
-
N. Koblitz ed., Springer-Verlag
-
M. Bellare, R. Canetti and H. Krawczyk, “Keying hash functions for message authentication,” Advances in Cryptology - Crypto ’96, LNCS Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996.
-
(1996)
Keying Hash Functions for Message Authentication, Advances in Cryptology - Crypto ’96, LNCS
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84937488217
-
A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation
-
M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
-
(1997)
Proceedings of the 38Th Symposium on Foundations of Computer Science, IEEE
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
D. Coppersmith ed., Springer-Verlag
-
M. Bellare, R. Guérin and P. Rogaway, “XOR MACs: New methods for message authentication using finite pseudorandom functions,” Advances in Cryptology - Crypto ’95, LNCS Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - Crypto ’95, LNCS
, vol.963
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
5
-
-
84983089516
-
The security of the cipher block chaining message authentication code
-
Y. Desmedt ed., Springer-Verlag
-
M. Bellare, J. Kilian and P. Rogaway, “The security of the cipher block chaining message authentication code,” Advances in Cryptology - Crypto ’94, LNCS Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - Crypto ’94, LNCS
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
7
-
-
84937488219
-
Concrete security characterizations of PRFs and PRPs: Reductions and applications
-
A. Desai and S. Miner, “Concrete security characterizations of PRFs and PRPs: Reductions and applications,” Full version of this paper, available via: http://www-cse.ucsd.edu/users/sminer/.
-
Full Version of This Paper
-
-
Desai, A.1
Miner, S.2
-
8
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions. Journal of the ACM, 33(4): 792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0023985465
-
A digital signature signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali and R. Rivest, “A digital signature signature scheme secure against adaptive chosen-message attacks,” SIAM J. of Computing, 17(2): 281-308, April 1988.
-
(1988)
SIAM J. Of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff, “How to construct pseudorandom permutations from pseudorandom functions,” SIAM J. Computing, 17(2), April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
12
-
-
84957617971
-
From unpredictability to indistinguishability: A simple construction of PRFs from MACs
-
H. Krawczyk ed., Springer-Verlag
-
M. Naor and O. Reingold, “From unpredictability to indistinguishability: A simple construction of PRFs from MACs,” Advances in Cryptology - Crypto ’98, LNCS Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - Crypto ’98, LNCS
, vol.1462
-
-
Naor, M.1
Reingold, O.2
|