-
1
-
-
33749544409
-
New proofs for NMAC and HMAC: Security without collision-resistance
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 602-619
-
-
Bellare, M.1
-
2
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction and its concrete security
-
Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. In: FOCS 1996, pp. 514-523 (1996)
-
(1996)
FOCS 1996
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS 1997, pp. 394-403 (1997)
-
(1997)
FOCS 1997
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362-399 (2000)
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
6
-
-
30744457437
-
Hash function balance and its impact on birthday attacks
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 401-418. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 401-418
-
-
Bellare, M.1
Kohno, T.2
-
7
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
8
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In:Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216-233. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
10
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.B.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.B.1
-
11
-
-
33745828152
-
Expanding pseudorandom functions; or: From knownplaintext security to chosen-plaintext security
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Damgård, I.B., Nielsen, J.B.: Expanding pseudorandom functions; or: From knownplaintext security to chosen-plaintext security. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 449-464. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 449-464
-
-
Damgård, I.B.1
Nielsen, J.B.2
-
12
-
-
43149124861
-
-
Fischlin, M.: Security of NMAC and HMAC based on non-malleability. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, 4964, pp. 138-154. Springer, Heidelberg (2008)
-
Fischlin, M.: Security of NMAC and HMAC based on non-malleability. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 138-154. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
0021567758
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: FOCS 1984, pp. 464-479 (1984)
-
(1984)
FOCS 1984
, pp. 464-479
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
15
-
-
38149084149
-
A simple variant of the Merkle-Damgård scheme with a permutation
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Hirose, S., Park, J.H., Yun, A.: A simple variant of the Merkle-Damgård scheme with a permutation. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 113-129. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 113-129
-
-
Hirose, S.1
Park, J.H.2
Yun, A.3
-
16
-
-
0033704913
-
Complete characterization of security notions for probabilistic private-key encryption
-
Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: STOC 2000, pp. 245-254 (2000)
-
(2000)
STOC 2000
, pp. 245-254
-
-
Katz, J.1
Yung, M.2
-
17
-
-
38049177352
-
A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Maurer, U., Sjödin, J.: A fast and key-efficient reduction of chosen-ciphertext to known-plaintext security. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 498-516. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 498-516
-
-
Maurer, U.1
Sjödin, J.2
-
18
-
-
84969346266
-
A certified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
19
-
-
0032647187
-
Synthesizers and their application to the parallel construction of pseudo-random functions
-
Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. Journal of Computer and System Sciences 58(2), 336-375 (1999)
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.2
, pp. 336-375
-
-
Naor, M.1
Reingold, O.2
-
20
-
-
38049144160
-
Range extension for weak PRFs; the good, the bad, and the ugly
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Pietrzak, K., Sjödin, J.: Range extension for weak PRFs; the good, the bad, and the ugly. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 517-533. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 517-533
-
-
Pietrzak, K.1
Sjödin, J.2
-
21
-
-
71049183202
-
Universal hashing and authentication codes
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Stinson, D.R.: Universal hashing and authentication codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 74-85. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
22
-
-
38149142690
-
Boosting Merkle-Damg?ard hashing for message authentication
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Yasuda, K.: Boosting Merkle-Damg?ard hashing for message authentication. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 216-231. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 216-231
-
-
Yasuda, K.1
|