-
1
-
-
0003629990
-
-
NIST:, FIPS PUB
-
NIST: Secure hash standard, FIPS PUB 180-2 (2002)
-
(2002)
Secure hash standard
, pp. 180-182
-
-
-
2
-
-
38149080045
-
-
Kaliski, B., Robshaw, M.: Message authentication with MD5. CryptoBytes (The Technical Newsletter of RSA Laboratories) 1(1), 5-8 (1995)
-
Kaliski, B., Robshaw, M.: Message authentication with MD5. CryptoBytes (The Technical Newsletter of RSA Laboratories) 1(1), 5-8 (1995)
-
-
-
-
3
-
-
84887264252
-
Formalizing human ignorance: Collision-resistant hashing without the keys
-
Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Rogaway, P.: Formalizing human ignorance: Collision-resistant hashing without the keys. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211-228. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 211-228
-
-
Rogaway, P.1
-
4
-
-
0347506735
-
Message authentication with one-way hash functions
-
Tsudik, G.: Message authentication with one-way hash functions. ACM Computer Communication Review 22(5), 29-38 (1992)
-
(1992)
ACM Computer Communication Review
, vol.22
, Issue.5
, pp. 29-38
-
-
Tsudik, G.1
-
5
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. IEEE Symposium on Foundations of Computer Science, 514-523 (1996)
-
(1996)
IEEE Symposium on Foundations of Computer Science
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
84947934697
-
On the security of two MAC algorithms
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Preneel, B., van Oorschot, P.C.: On the security of two MAC algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 19-32. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 19-32
-
-
Preneel, B.1
van Oorschot, P.C.2
-
10
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
11
-
-
33749544409
-
New proofs for NMAC and HMAC: Security without collision-resistance
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 602-619
-
-
Bellare, M.1
-
12
-
-
26444518444
-
-
Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 353-368. Springer, Heidelberg (2003)
-
Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 353-368. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
38149027308
-
-
TR45.AHAG: Enhanced cryptographic algorithms, revision B. TIA 2002
-
TR45.AHAG: Enhanced cryptographic algorithms, revision B. TIA (2002)
-
-
-
-
14
-
-
33750029023
-
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
77649243367
-
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 37-53
-
-
Contini, S.1
Yin, Y.L.2
-
17
-
-
38149125785
-
The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive
-
Report 2004/304
-
Bellare, M., Goldreich, O., Mityagin, A.: The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive: Report 2004/304 (2004)
-
(2004)
-
-
Bellare, M.1
Goldreich, O.2
Mityagin, A.3
-
18
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
|