-
1
-
-
84957098482
-
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
An, J.H., Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 252-269. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 252-269
-
-
An, J.H.1
Bellare, M.2
-
2
-
-
33749544409
-
New Proofs for NMAC and HMAC: Security without Collision-Resistance
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Bellare, M.: New Proofs for NMAC and HMAC: Security without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
-
-
Bellare, M.1
-
3
-
-
84983089516
-
The Security of Cipher Block Chaining
-
Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
-
Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 341-358. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
4
-
-
33745136125
-
Improved Security Analyses for CBC MACs
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Bellare, M., Pietrzak, K., Rogaway, P.: Improved Security Analyses for CBC MACs. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 527-545. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 527-545
-
-
Bellare, M.1
Pietrzak, K.2
Rogaway, P.3
-
5
-
-
0030416137
-
Pseudorandom Functions Re-visited: The Cascade Construction and Its Concrete Security
-
IEEE, Los Alamitos
-
Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom Functions Re-visited: The Cascade Construction and Its Concrete Security. In: Proc. 37th FOCS, pp. 514-523. IEEE, Los Alamitos (1996)
-
(1996)
Proc. 37th FOCS
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
77649268663
-
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
-
-
Bellare, M.1
Ristenpart, T.2
-
8
-
-
50449107349
-
Black-Box Analysis of the Block Cipher-Based Hash-Function Constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
9
-
-
24944511624
-
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Black, J., Cochran, M., Shrimpton, T.: On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 526-541. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 526-541
-
-
Black, J.1
Cochran, M.2
Shrimpton, T.3
-
10
-
-
33745119040
-
Merkle-Damgård Revisited: How to Construct a Hash Function
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård Revisited: How to Construct a Hash Function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
11
-
-
84981199109
-
A Design Principle for Hash Functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
12
-
-
35048839833
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
14
-
-
38049138727
-
-
Dodis, Y., Puniya, P.: l Feistel Networks Made Public, and Applications. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 534-554. Springer, Heidelberg (2007)
-
Dodis, Y., Puniya, P.: l Feistel Networks Made Public, and Applications. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 534-554. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
84947240143
-
Indistinguishability of Random Systems
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Maurer, U.: Indistinguishability of Random Systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 110-132
-
-
Maurer, U.1
-
16
-
-
26444528403
-
Single-key AIL-MACs from any FIL-MAC
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Maurer, U., Sjodin, J.: Single-key AIL-MACs from any FIL-MAC. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
-
-
Maurer, U.1
Sjodin, J.2
-
17
-
-
38049140585
-
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Maurer, U., Tessaro, S.: Domain Extension of Public Random Functions: Beyond the Birthday Barrier. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 187-204. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 187-204
-
-
Maurer, U.1
Tessaro, S.2
-
18
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
19
-
-
0004775324
-
CBC MAC for Real-Time Data Sources
-
Petrank, E., Rackoff, C.: CBC MAC for Real-Time Data Sources. J. Cryptology 13(3), 315-338 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 315-338
-
-
Petrank, E.1
Rackoff, C.2
-
20
-
-
33746358237
-
ICALP 2006
-
for EMAC, Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, Springer, Heidelberg
-
Pietrzak, K.: A Tight Bound for EMAC. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 168-179. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 168-179
-
-
Pietrzak, K.1
Tight Bound, A.2
-
21
-
-
85026897539
-
Hash Functions Based on Block Ciphers: A Synthetic Approach
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Preneel, B., Govaerts, R., Vandewalle, J.: Hash Functions Based on Block Ciphers: A Synthetic Approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
22
-
-
44449148611
-
-
Rogaway, P., Steinberger, J.: How to Build a Permutation-Based Hash Function. In: Dagstuhl workshop (September 2007)
-
Rogaway, P., Steinberger, J.: How to Build a Permutation-Based Hash Function. In: Dagstuhl workshop (September 2007)
-
-
-
-
23
-
-
44449163230
-
Security/Efficiency Tradeoffs for Permutation-Based Hashing
-
Istanbul, Turkey April
-
Rogaway, P., Steinberger, J.: Security/Efficiency Tradeoffs for Permutation-Based Hashing. In: Eurocrypt 2008, Istanbul, Turkey (April 2008)
-
(2008)
Eurocrypt 2008
-
-
Rogaway, P.1
Steinberger, J.2
-
24
-
-
44449098971
-
Building a Collision-Resistant Compression Function from Non-Compressing Primitives, Cryptology ePrint Archive
-
Report 2007/409
-
Shrimpton, T., Stam, M.: Building a Collision-Resistant Compression Function from Non-Compressing Primitives, Cryptology ePrint Archive: Report 2007/409
-
-
-
Shrimpton, T.1
Stam, M.2
-
25
-
-
84957690790
-
Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Simon, D.R.: Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 334-345. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 334-345
-
-
Simon, D.R.1
|