메뉴 건너뛰기




Volumn 5665 LNCS, Issue , 2009, Pages 394-415

HBS: A single-key mode of operation for deterministic authenticated encryption

Author keywords

Counter mode; Security proof; SIV; Universal hash function

Indexed keywords

AUTHENTICATED ENCRYPTION; COUNTER MODE; FINITE FIELDS; INPUT POLYNOMIALS; MODE OF OPERATIONS; SECURITY PROOF; SECURITY PROOFS; SIV; UNIVERSAL HASH FUNCTION;

EID: 70350417930     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03317-9_24     Document Type: Conference Paper
Times cited : (35)

References (19)
  • 1
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362-399 (2000)
    • (2000) J. Comput. Syst. Sci , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 2
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 51849140875 scopus 로고    scopus 로고
    • Key-recovery attacks on universal hash function based MAC algorithms
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Handschuh, H., Preneel, B.: Key-recovery attacks on universal hash function based MAC algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 144-161. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 144-161
    • Handschuh, H.1    Preneel, B.2
  • 5
    • 0242656059 scopus 로고    scopus 로고
    • Iwata, T., Kurosawa, K.: OMAC.: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 129-153. Springer, Heidelberg (2003)
    • Iwata, T., Kurosawa, K.: OMAC.: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129-153. Springer, Heidelberg (2003)
  • 6
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373-386 (1988)
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 7
    • 84948969374 scopus 로고    scopus 로고
    • The sum of PRPs is a secure PRF
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Lucks, S.: The sum of PRPs is a secure PRF. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 470-484. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 470-484
    • Lucks, S.1
  • 8
    • 33646776051 scopus 로고    scopus 로고
    • A failure-friendly design principle for hash functions
    • Roy, B.K, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Lucks, S.: A failure-friendly design principle for hash functions. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 474-494
    • Lucks, S.1
  • 9
    • 33845303377 scopus 로고    scopus 로고
    • The security and performance of the Galois/counter mode (GCM) of operation
    • Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
    • McGrew, D.A., Viega, J.: The security and performance of the Galois/counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343-355. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3348 , pp. 343-355
    • McGrew, D.A.1    Viega, J.2
  • 12
    • 35048880937 scopus 로고    scopus 로고
    • Security of random Feistel schemes with 5 or more rounds
    • Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
    • Patarin, J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 106-122. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 106-122
    • Patarin, J.1
  • 13
    • 0035750947 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • ACM Press, New York
    • Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: ACM CCS, pp. 196-205. ACM Press, New York (2001)
    • (2001) ACM CCS , pp. 196-205
    • Rogaway, P.1    Bellare, M.2    Black, J.3    Krovetz, T.4
  • 14
    • 0037673324 scopus 로고    scopus 로고
    • Authenticated-encryption with associated-data
    • Atluri, V, ed, ACM Press, New York
    • Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) ACM CCS, pp. 98-107. ACM Press, New York (2002)
    • (2002) ACM CCS , pp. 98-107
    • Rogaway, P.1
  • 15
    • 35048855085 scopus 로고    scopus 로고
    • Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 348-359. Springer, Heidelberg (2004)
    • Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004)
  • 16
    • 33746068613 scopus 로고    scopus 로고
    • A provable-security treatment of the key-wrap problem
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 373-390
    • Rogaway, P.1    Shrimpton, T.2
  • 17
    • 34547285694 scopus 로고    scopus 로고
    • High-speed hardware architectures for authenticated encryption mode GCM
    • Friedman, E.G, Theodoridis, S, eds, IEEE Press, Los Alamitos
    • Satoh, A.: High-speed hardware architectures for authenticated encryption mode GCM. In: Friedman, E.G., Theodoridis, S. (eds.) IEEE ISCAS 2006, pp. 4831-4844. IEEE Press, Los Alamitos (2006)
    • (2006) IEEE ISCAS , pp. 4831-4844
    • Satoh, A.1
  • 18
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265-279 (1981)
    • (1981) J. Comput. Syst. Sci , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.