메뉴 건너뛰기




Volumn 4833 LNCS, Issue , 2007, Pages 216-231

Boosting Merkle-Damgård hashing for message authentication

Author keywords

Compression function; Hash function; HMAC; Merkle Damg rd; Message authentication code; Mode of operation; NMAC; Pseudo random function; Related key attack

Indexed keywords

AUTHENTICATION; FUNCTION EVALUATION; ITERATIVE METHODS;

EID: 38149142690     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76900-2_13     Document Type: Conference Paper
Times cited : (18)

References (22)
  • 1
    • 84957098482 scopus 로고    scopus 로고
    • Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • An, J.H., Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 252-269. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 252-269
    • An, J.H.1    Bellare, M.2
  • 2
    • 33749544409 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 602-619
    • Bellare, M.1
  • 4
    • 84954417747 scopus 로고    scopus 로고
    • Bellare, M., Guérin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudorandom functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, 963, pp. 15-28. Springer, Heidelberg (1995)
    • Bellare, M., Guérin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudorandom functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 15-28. Springer, Heidelberg (1995)
  • 5
    • 77649268663 scopus 로고    scopus 로고
    • Multi-property-preserving hash domain extension and the EMD transform
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 299-314
    • Bellare, M.1    Ristenpart, T.2
  • 6
    • 38149004817 scopus 로고    scopus 로고
    • Hash functions in the dedicated-key setting: Design choices and MPP transforms
    • Arge, L, Cachin, C, Jurdzinski, T, Tarlecki, A, eds, ICALP 2007, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Hash functions in the dedicated-key setting: Design choices and MPP transforms. In: Arge, L., Cachin, C., Jurdzinski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 399-410. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4596 , pp. 399-410
    • Bellare, M.1    Ristenpart, T.2
  • 7
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470-484. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 37-53
    • Contini, S.1    Yin, Y.L.2
  • 9
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgård revisited: How to construct a hash function
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Coron, J.S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 430-448
    • Coron, J.S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 10
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 416-427
    • Damgård, I.1
  • 11
    • 84985796089 scopus 로고    scopus 로고
    • den Boer, B., Bosselaers, A.: Collisions for the compressin function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
    • den Boer, B., Bosselaers, A.: Collisions for the compressin function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
  • 12
    • 33749549095 scopus 로고    scopus 로고
    • Strengthening digital signatures via randomized hashing
    • Dwork, C ed, CRYPTO 2006, Springer, Heidelberg
    • Halevi, S., Krawcyzk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41-59. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 41-59
    • Halevi, S.1    Krawcyzk, H.2
  • 13
    • 33750029023 scopus 로고    scopus 로고
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
  • 14
    • 33646776051 scopus 로고    scopus 로고
    • A failure-friendly design principle for hash functions
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Lucks, S.: A failure-friendly design principle for hash functions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 474-494
    • Lucks, S.1
  • 15
    • 26444528403 scopus 로고    scopus 로고
    • Single-key AIL-MACs from any FIL-MAC
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Maurer, U.M., Sjödin, J.: Single-key AIL-MACs from any FIL-MAC. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 472-484. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 472-484
    • Maurer, U.M.1    Sjödin, J.2
  • 16
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 19
    • 26444518444 scopus 로고    scopus 로고
    • Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 353-368. Springer, Heidelberg (2003)
    • Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 353-368. Springer, Heidelberg (2003)
  • 21
    • 84948968075 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 445-452. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 445-452
    • Shoup, V.1
  • 22
    • 38149068247 scopus 로고    scopus 로고
    • Yasuda, K.: Sandwich is indeed secure: How to authenticate a message with just one hashing. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 355-369. Springer, Heidelberg (2007)
    • Yasuda, K.: "Sandwich" is indeed secure: How to authenticate a message with just one hashing. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 355-369. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.