메뉴 건너뛰기




Volumn 4964 LNCS, Issue , 2008, Pages 138-154

Security of NMAC and HMAC based on non-malleability

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CODES (SYMBOLS); CRYPTOGRAPHY; MESSAGE PASSING; SECURITY SYSTEMS;

EID: 43149124861     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79263-5_9     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 84957098482 scopus 로고    scopus 로고
    • Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • An, J.H. Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS. vol. 1666. pp. 252-269. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 252-269
    • An, J.H.1    Bellare, M.2
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security
    • IEEE Computer Society Press, Los Alamitos
    • Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. In: Proceedings of the Annual Symposium on Foundations of Computer Science FOCS 1996, pp. 514-523. IEEE Computer Society Press, Los Alamitos (1996)
    • (1996) Proceedings of the Annual Symposium on Foundations of Computer Science , vol.FOCS 1996 , pp. 514-523
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 33749544409 scopus 로고    scopus 로고
    • New Proofs for NMAC and HMAC: Security Without Collision-Resistance
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Bellare, M.: New Proofs for NMAC and HMAC: Security Without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 602-619
    • Bellare, M.1
  • 6
    • 38149125785 scopus 로고    scopus 로고
    • The Power of Verification Queries in Message Authentication and Authenticated Encryption
    • Bellare, M., Goldreich, O., Mityagin, A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Number 2004/309 in Cryptology eprint archive (2004), http://eprint.iacr.org
    • (2004) Cryptology eprint archive , Issue.2004-2309
    • Bellare, M.1    Goldreich, O.2    Mityagin, A.3
  • 7
    • 35248860702 scopus 로고    scopus 로고
    • A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Bellare, M., Kohno, T.: A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 8
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 37-53
    • Contini, S.1    Yin, Y.L.2
  • 9
    • 33750029023 scopus 로고    scopus 로고
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256, Springer, Heidelberg (2006)
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256, Springer, Heidelberg (2006)
  • 10
    • 38549124309 scopus 로고    scopus 로고
    • On Authentication With HMAC and Non-Rondom Properties
    • Financial Cryptography FC 2007, Springer, Heidelberg
    • Rechberger, C., Rijmen, V.: On Authentication With HMAC and Non-Rondom Properties, In: Financial Cryptography FC 2007. LNCS, vol. 4886, pp. 119-133. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4886 , pp. 119-133
    • Rechberger, C.1    Rijmen, V.2
  • 11
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 12
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005, LNCS, 3621, pp. 17-36, Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005, LNCS, vol. 3621, pp. 17-36, Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.