메뉴 건너뛰기




Volumn 963, Issue , 1995, Pages 1-14

MDx-MAC and building fast MACs from hash functions

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY;

EID: 51549120471     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44750-4_1     Document Type: Conference Paper
Times cited : (154)

References (29)
  • 2
    • 84887300122 scopus 로고    scopus 로고
    • XOR MACs: New methods for message authentication using block ciphers
    • (this volume)
    • M. Bellare, R. Guérin, P. Rogaway, "XOR MACs: new methods for message authentication using block ciphers," Proc. Crypto'95 (this volume).
    • Proc. Crypto'95
    • Bellare, M.1    Guérin, R.2    Rogaway, P.3
  • 3
    • 27544455677 scopus 로고
    • A cryptographic checksum for integrity protection
    • F. Cohen, "A cryptographic checksum for integrity protection," Computers & Security, Vol. 6, No. 5, 1987, pp. 505-510.
    • (1987) Computers & Security , vol.6 , Issue.5 , pp. 505-510
    • Cohen, F.1
  • 4
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Springer-Verlag
    • I.B. Damgård, "A design principle for hash functions," Proc. Crypto'89, LNCS 435, Springer-Verlag, 1990, pp. 416-427.
    • (1990) Proc. Crypto'89, LNCS 435 , pp. 416-427
    • Damgård, I.B.1
  • 5
    • 84985785183 scopus 로고
    • A message authenticator algorithm suitable for a mainframe computer
    • Springer-Verlag
    • D. Davies, "A message authenticator algorithm suitable for a mainframe computer," Proc. Crypto'84, LNCS 196, Springer-Verlag, 1985, pp. 393-400.
    • (1985) Proc. Crypto'84, LNCS 196 , pp. 393-400
    • Davies, D.1
  • 6
    • 78649262413 scopus 로고
    • The message authenticator algorithm (MAA) and its implementation
    • Feb
    • D. Davies, D.O. Clayden, "The message authenticator algorithm (MAA) and its implementation," NPL Report DITC 109/88, Feb. 1988.
    • (1988) NPL Report DITC 109/88
    • Davies, D.1    Clayden, D.O.2
  • 8
    • 85029523925 scopus 로고
    • An attack on the last two rounds of MD4
    • Springer-Verlag
    • B. den Boer, A. Bosselaers, "An attack on the last two rounds of MD4," Proc. Crypto'91, LNCS 576, Springer-Verlag, 1992, pp. 194-203.
    • (1992) Proc. Crypto'91, LNCS 576 , pp. 194-203
    • den Boer, B.1    Bosselaers, A.2
  • 9
    • 84985796089 scopus 로고
    • Collisions for the compression function of MD5
    • Springer-Verlag
    • B. den Boer, A. Bosselaers, "Collisions for the compression function of MD5," Proc. Eurocrypt'93, LNCS 765, Springer-Verlag, 1994, pp. 293-304.
    • (1994) Proc. Eurocrypt'93, LNCS 765 , pp. 293-304
    • den Boer, B.1    Bosselaers, A.2
  • 10
    • 0003508568 scopus 로고
    • NBS, U.S. Department of Commerce, Washington D.C., Jan
    • FIPS 46, Data encryption standard, NBS, U.S. Department of Commerce, Washington D.C., Jan. 1977.
    • (1977) Data encryption standard
    • FIPS 461
  • 11
    • 0004246335 scopus 로고
    • NBS, US Department of Commerce, Washington D. C., Dec
    • FIPS 81, DES modes of operation, NBS, US Department of Commerce, Washington D. C., Dec. 1980.
    • (1980) DES modes of operation
    • FIPS 811
  • 12
    • 0003629991 scopus 로고
    • NIST, US Department of Commerce, Washington D.C., April
    • FIPS 180-1, Secure hash standard, NIST, US Department of Commerce, Washington D.C., April 1995.
    • (1995) Secure hash standard
    • FIPS 180-11
  • 14
    • 84957610593 scopus 로고
    • Banking - Approved algorithms for message authentication, Part 1, DEA, IS 8731-1
    • IS 8731-2
    • ISO 8731:1987, Banking - approved algorithms for message authentication, Part 1, DEA, IS 8731-1, Part 2, Message Authentication Algorithm (MAA), IS 8731-2.
    • (1987) Part 2, Message Authentication Algorithm (MAA)
    • ISO 87311
  • 16
    • 84878363139 scopus 로고
    • On the relation between A-codes and codes correcting independent errors
    • Springer- Verlag
    • T. Johansson, G. Kabatianskii, B. Smeets, "On the relation between A-codes and codes correcting independent errors," Proc. Eurocrypt'93, LNCS 765, Springer- Verlag, 1994, pp. 1-11.
    • (1994) Proc. Eurocrypt'93, LNCS 765 , pp. 1-11
    • Johansson, T.1    Kabatianskii, G.2    Smeets, B.3
  • 19
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Springer-Verlag
    • H. Krawczyk, "LFSR-based hashing and authentication," Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 129-139.
    • (1994) Proc. Crypto'94, LNCS 839 , pp. 129-139
    • Krawczyk, H.1
  • 20
    • 84957613606 scopus 로고
    • The Kerberos Version 5 GSS-API Mechanism
    • Feb
    • J. Linn, "The Kerberos Version 5 GSS-API Mechanism," Internet Draft, Feb. 1995.
    • (1995) Internet Draft
    • Linn, J.1
  • 21
    • 50849147684 scopus 로고
    • Solutions to the multidestination secure electronic mail problem
    • C. Mitchell, M. Walker, "Solutions to the multidestination secure electronic mail problem," Computers & Security, Vol. 7, No. 5, 1988, pp. 483-488.
    • (1988) Computers & Security , vol.7 , Issue.5 , pp. 483-488
    • Mitchell, C.1    Walker, M.2
  • 24
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • Springer-Verlag
    • R.L. Rivest, "The MD4 message digest algorithm," Proc. Crypto'90, LNCS 537, Springer-Verlag, 1991, pp. 303-311.
    • (1991) Proc. Crypto'90, LNCS 537 , pp. 303-311
    • Rivest, R.L.1
  • 25
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Internet Activities Board, Internet Privacy Task Force, April
    • R.L. Rivest, "The MD5 message-digest algorithm," Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
    • (1992) Request for Comments (RFC) 1321
    • Rivest, R.L.1
  • 26
    • 0347506735 scopus 로고
    • Message authentication with one-way hash functions
    • G. Tsudik, "Message authentication with one-way hash functions," ACM Computer Communications Review, Vol. 22, No. 5, 1992, pp. 29-38.
    • (1992) ACM Computer Communications Review , vol.22 , Issue.5 , pp. 29-38
    • Tsudik, G.1
  • 27
    • 84948973102 scopus 로고
    • On the need for multipermutations: Cryptanalysis of MD4 and SAFER
    • Springer-Verlag, (to appear)
    • S. Vaudenay, "On the need for multipermutations: cryptanalysis of MD4 and SAFER," Fast Software Encryption, LNCS, Springer-Verlag, 1995 (to appear).
    • (1995) Fast Software Encryption, LNCS
    • Vaudenay, S.1
  • 28
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman, J.L. Carter, "New hash functions and their use in authentication and set equality," J. Computer Sys. Sciences, Vol. 22, No. 3, 1981, pp. 265-279.
    • (1981) J. Computer Sys. Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 29
    • 1842531284 scopus 로고
    • Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May. Presented at the rump session of Crypto'93
    • M. J. Wiener, "Efficient DES key search," Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto'93.
    • (1994) Efficient DES key search
    • Wiener, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.