메뉴 건너뛰기




Volumn 4586 LNCS, Issue , 2007, Pages 355-369

"Sandwich" is indeed secure: How to authenticate a message with just one hashing

Author keywords

Compression function; Envelope MAC; Hash function; HMAC; MAC; Merkle Damg rd; Message authentication code; RFC1828

Indexed keywords

FUNCTION EVALUATION; ITERATIVE METHODS; MESSAGE PASSING; SECURITY OF DATA;

EID: 38149068247     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73458-1_26     Document Type: Conference Paper
Times cited : (29)

References (18)
  • 1
    • 0003629990 scopus 로고    scopus 로고
    • NIST:, FIPS PUB
    • NIST: Secure hash standard, FIPS PUB 180-2 (2002)
    • (2002) Secure hash standard , pp. 180-182
  • 2
    • 38149080045 scopus 로고    scopus 로고
    • Kaliski, B., Robshaw, M.: Message authentication with MD5. CryptoBytes (The Technical Newsletter of RSA Laboratories) 1(1), 5-8 (1995)
    • Kaliski, B., Robshaw, M.: Message authentication with MD5. CryptoBytes (The Technical Newsletter of RSA Laboratories) 1(1), 5-8 (1995)
  • 3
    • 84887264252 scopus 로고    scopus 로고
    • Formalizing human ignorance: Collision-resistant hashing without the keys
    • Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
    • Rogaway, P.: Formalizing human ignorance: Collision-resistant hashing without the keys. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211-228. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 211-228
    • Rogaway, P.1
  • 4
    • 0347506735 scopus 로고
    • Message authentication with one-way hash functions
    • Tsudik, G.: Message authentication with one-way hash functions. ACM Computer Communication Review 22(5), 29-38 (1992)
    • (1992) ACM Computer Communication Review , vol.22 , Issue.5 , pp. 29-38
    • Tsudik, G.1
  • 8
    • 84947934697 scopus 로고    scopus 로고
    • On the security of two MAC algorithms
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Preneel, B., van Oorschot, P.C.: On the security of two MAC algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 19-32. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 19-32
    • Preneel, B.1    van Oorschot, P.C.2
  • 10
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 11
    • 33749544409 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 602-619
    • Bellare, M.1
  • 12
    • 26444518444 scopus 로고    scopus 로고
    • Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 353-368. Springer, Heidelberg (2003)
    • Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 353-368. Springer, Heidelberg (2003)
  • 13
    • 38149027308 scopus 로고    scopus 로고
    • TR45.AHAG: Enhanced cryptographic algorithms, revision B. TIA 2002
    • TR45.AHAG: Enhanced cryptographic algorithms, revision B. TIA (2002)
  • 14
    • 33750029023 scopus 로고    scopus 로고
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
  • 15
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 37-53
    • Contini, S.1    Yin, Y.L.2
  • 17
    • 38149125785 scopus 로고    scopus 로고
    • The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive
    • Report 2004/304
    • Bellare, M., Goldreich, O., Mityagin, A.: The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive: Report 2004/304 (2004)
    • (2004)
    • Bellare, M.1    Goldreich, O.2    Mityagin, A.3
  • 18
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.