-
1
-
-
84957098482
-
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
An, J.H. Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS. vol. 1666. pp. 252-269. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 252-269
-
-
An, J.H.1
Bellare, M.2
-
2
-
-
43149112233
-
-
manuscript
-
Boldyreva, A., Cash, D., Fischlin, M., Warinschi, B.: Non-Malleable Hash Functions, Non-Malleable Hash Functions (manuscript. 2007)
-
(2007)
Non-Malleable Hash Functions, Non-Malleable Hash Functions
-
-
Boldyreva, A.1
Cash, D.2
Fischlin, M.3
Warinschi, B.4
-
3
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0030416137
-
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security
-
IEEE Computer Society Press, Los Alamitos
-
Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. In: Proceedings of the Annual Symposium on Foundations of Computer Science FOCS 1996, pp. 514-523. IEEE Computer Society Press, Los Alamitos (1996)
-
(1996)
Proceedings of the Annual Symposium on Foundations of Computer Science
, vol.FOCS 1996
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
33749544409
-
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Bellare, M.: New Proofs for NMAC and HMAC: Security Without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 602-619
-
-
Bellare, M.1
-
6
-
-
38149125785
-
The Power of Verification Queries in Message Authentication and Authenticated Encryption
-
Bellare, M., Goldreich, O., Mityagin, A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Number 2004/309 in Cryptology eprint archive (2004), http://eprint.iacr.org
-
(2004)
Cryptology eprint archive
, Issue.2004-2309
-
-
Bellare, M.1
Goldreich, O.2
Mityagin, A.3
-
7
-
-
35248860702
-
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Bellare, M., Kohno, T.: A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 491-506
-
-
Bellare, M.1
Kohno, T.2
-
8
-
-
77649243367
-
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 37-53
-
-
Contini, S.1
Yin, Y.L.2
-
9
-
-
33750029023
-
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256, Springer, Heidelberg (2006)
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256, Springer, Heidelberg (2006)
-
-
-
-
10
-
-
38549124309
-
On Authentication With HMAC and Non-Rondom Properties
-
Financial Cryptography FC 2007, Springer, Heidelberg
-
Rechberger, C., Rijmen, V.: On Authentication With HMAC and Non-Rondom Properties, In: Financial Cryptography FC 2007. LNCS, vol. 4886, pp. 119-133. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 119-133
-
-
Rechberger, C.1
Rijmen, V.2
-
11
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35, Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
12
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005, LNCS, 3621, pp. 17-36, Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005, LNCS, vol. 3621, pp. 17-36, Springer, Heidelberg (2005)
-
-
-
|