-
1
-
-
84957098482
-
Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
An, J.H., Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 252-269. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 252-269
-
-
An, J.H.1
Bellare, M.2
-
2
-
-
33749544409
-
New proofs for NMAC and HMAC: Security without collision-resistance
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 602-619
-
-
Bellare, M.1
-
3
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. In: IEEE Symposium on Foundations of Computer Science, pp. 514-523 (1996)
-
(1996)
IEEE Symposium on Foundations of Computer Science
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84954417747
-
-
Bellare, M., Guérin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudorandom functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, 963, pp. 15-28. Springer, Heidelberg (1995)
-
Bellare, M., Guérin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudorandom functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 15-28. Springer, Heidelberg (1995)
-
-
-
-
5
-
-
77649268663
-
Multi-property-preserving hash domain extension and the EMD transform
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 299-314
-
-
Bellare, M.1
Ristenpart, T.2
-
6
-
-
38149004817
-
Hash functions in the dedicated-key setting: Design choices and MPP transforms
-
Arge, L, Cachin, C, Jurdzinski, T, Tarlecki, A, eds, ICALP 2007, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Hash functions in the dedicated-key setting: Design choices and MPP transforms. In: Arge, L., Cachin, C., Jurdzinski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 399-410. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4596
, pp. 399-410
-
-
Bellare, M.1
Ristenpart, T.2
-
7
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470-484. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
77649243367
-
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 37-53
-
-
Contini, S.1
Yin, Y.L.2
-
9
-
-
33745119040
-
Merkle-Damgård revisited: How to construct a hash function
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Coron, J.S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
10
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
11
-
-
84985796089
-
-
den Boer, B., Bosselaers, A.: Collisions for the compressin function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
-
den Boer, B., Bosselaers, A.: Collisions for the compressin function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
-
-
-
-
12
-
-
33749549095
-
Strengthening digital signatures via randomized hashing
-
Dwork, C ed, CRYPTO 2006, Springer, Heidelberg
-
Halevi, S., Krawcyzk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41-59. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 41-59
-
-
Halevi, S.1
Krawcyzk, H.2
-
13
-
-
33750029023
-
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
33646776051
-
A failure-friendly design principle for hash functions
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Lucks, S.: A failure-friendly design principle for hash functions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 474-494
-
-
Lucks, S.1
-
15
-
-
26444528403
-
Single-key AIL-MACs from any FIL-MAC
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Maurer, U.M., Sjödin, J.: Single-key AIL-MACs from any FIL-MAC. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 472-484. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 472-484
-
-
Maurer, U.M.1
Sjödin, J.2
-
16
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
19
-
-
26444518444
-
-
Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 353-368. Springer, Heidelberg (2003)
-
Patel, S.: An efficient MAC for short messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 353-368. Springer, Heidelberg (2003)
-
-
-
-
21
-
-
84948968075
-
A composition theorem for universal one-way hash functions
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 445-452. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 445-452
-
-
Shoup, V.1
-
22
-
-
38149068247
-
-
Yasuda, K.: Sandwich is indeed secure: How to authenticate a message with just one hashing. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 355-369. Springer, Heidelberg (2007)
-
Yasuda, K.: "Sandwich" is indeed secure: How to authenticate a message with just one hashing. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 355-369. Springer, Heidelberg (2007)
-
-
-
|