메뉴 건너뛰기




Volumn 4965 LNCS, Issue , 2008, Pages 198-219

A new mode of operation for block ciphers and length-preserving MACs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; FUNCTIONS; MATHEMATICAL MODELS;

EID: 44449166046     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78967-3_12     Document Type: Conference Paper
Times cited : (31)

References (25)
  • 1
    • 84957098482 scopus 로고    scopus 로고
    • Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • An, J.H., Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 252-269. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 252-269
    • An, J.H.1    Bellare, M.2
  • 2
    • 33749544409 scopus 로고    scopus 로고
    • New Proofs for NMAC and HMAC: Security without Collision-Resistance
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Bellare, M.: New Proofs for NMAC and HMAC: Security without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117
    • Bellare, M.1
  • 3
    • 84983089516 scopus 로고
    • The Security of Cipher Block Chaining
    • Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
    • Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 341-358. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 4
    • 33745136125 scopus 로고    scopus 로고
    • Improved Security Analyses for CBC MACs
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Bellare, M., Pietrzak, K., Rogaway, P.: Improved Security Analyses for CBC MACs. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 527-545. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 527-545
    • Bellare, M.1    Pietrzak, K.2    Rogaway, P.3
  • 5
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom Functions Re-visited: The Cascade Construction and Its Concrete Security
    • IEEE, Los Alamitos
    • Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom Functions Re-visited: The Cascade Construction and Its Concrete Security. In: Proc. 37th FOCS, pp. 514-523. IEEE, Los Alamitos (1996)
    • (1996) Proc. 37th FOCS , pp. 514-523
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 77649268663 scopus 로고    scopus 로고
    • Multi-Property-Preserving Hash Domain Extension and the EMD Transform
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284
    • Bellare, M.1    Ristenpart, T.2
  • 8
    • 50449107349 scopus 로고    scopus 로고
    • Black-Box Analysis of the Block Cipher-Based Hash-Function Constructions from PGV
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 9
    • 24944511624 scopus 로고    scopus 로고
    • On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Black, J., Cochran, M., Shrimpton, T.: On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 526-541. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 526-541
    • Black, J.1    Cochran, M.2    Shrimpton, T.3
  • 10
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgård Revisited: How to Construct a Hash Function
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård Revisited: How to Construct a Hash Function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 430-448
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 11
    • 84981199109 scopus 로고
    • A Design Principle for Hash Functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damgård, I.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 416-427
    • Damgård, I.1
  • 12
    • 35048839833 scopus 로고    scopus 로고
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 14
    • 38049138727 scopus 로고    scopus 로고
    • Dodis, Y., Puniya, P.: l Feistel Networks Made Public, and Applications. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 534-554. Springer, Heidelberg (2007)
    • Dodis, Y., Puniya, P.: l Feistel Networks Made Public, and Applications. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 534-554. Springer, Heidelberg (2007)
  • 15
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of Random Systems
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Maurer, U.: Indistinguishability of Random Systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 110-132
    • Maurer, U.1
  • 16
    • 26444528403 scopus 로고    scopus 로고
    • Single-key AIL-MACs from any FIL-MAC
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Maurer, U., Sjodin, J.: Single-key AIL-MACs from any FIL-MAC. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580
    • Maurer, U.1    Sjodin, J.2
  • 17
    • 38049140585 scopus 로고    scopus 로고
    • Domain Extension of Public Random Functions: Beyond the Birthday Barrier
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Maurer, U., Tessaro, S.: Domain Extension of Public Random Functions: Beyond the Birthday Barrier. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 187-204. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 187-204
    • Maurer, U.1    Tessaro, S.2
  • 18
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-446
    • Merkle, R.1
  • 19
    • 0004775324 scopus 로고    scopus 로고
    • CBC MAC for Real-Time Data Sources
    • Petrank, E., Rackoff, C.: CBC MAC for Real-Time Data Sources. J. Cryptology 13(3), 315-338 (2000)
    • (2000) J. Cryptology , vol.13 , Issue.3 , pp. 315-338
    • Petrank, E.1    Rackoff, C.2
  • 20
    • 33746358237 scopus 로고    scopus 로고
    • ICALP 2006
    • for EMAC, Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, Springer, Heidelberg
    • Pietrzak, K.: A Tight Bound for EMAC. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 168-179. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 168-179
    • Pietrzak, K.1    Tight Bound, A.2
  • 21
    • 85026897539 scopus 로고
    • Hash Functions Based on Block Ciphers: A Synthetic Approach
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Preneel, B., Govaerts, R., Vandewalle, J.: Hash Functions Based on Block Ciphers: A Synthetic Approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 22
    • 44449148611 scopus 로고    scopus 로고
    • Rogaway, P., Steinberger, J.: How to Build a Permutation-Based Hash Function. In: Dagstuhl workshop (September 2007)
    • Rogaway, P., Steinberger, J.: How to Build a Permutation-Based Hash Function. In: Dagstuhl workshop (September 2007)
  • 23
    • 44449163230 scopus 로고    scopus 로고
    • Security/Efficiency Tradeoffs for Permutation-Based Hashing
    • Istanbul, Turkey April
    • Rogaway, P., Steinberger, J.: Security/Efficiency Tradeoffs for Permutation-Based Hashing. In: Eurocrypt 2008, Istanbul, Turkey (April 2008)
    • (2008) Eurocrypt 2008
    • Rogaway, P.1    Steinberger, J.2
  • 24
    • 44449098971 scopus 로고    scopus 로고
    • Building a Collision-Resistant Compression Function from Non-Compressing Primitives, Cryptology ePrint Archive
    • Report 2007/409
    • Shrimpton, T., Stam, M.: Building a Collision-Resistant Compression Function from Non-Compressing Primitives, Cryptology ePrint Archive: Report 2007/409
    • Shrimpton, T.1    Stam, M.2
  • 25
    • 84957690790 scopus 로고    scopus 로고
    • Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Simon, D.R.: Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 334-345. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 334-345
    • Simon, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.