-
1
-
-
33748021549
-
File verification using CRC
-
May
-
Nelson M., "File verification using CRC", Dr Dobbs Journal, May 1992, pp.64-67.
-
(1992)
Dr Dobbs Journal
, pp. 64-67
-
-
Nelson, M.1
-
2
-
-
0343387037
-
Data cryptographic techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm,
-
ISO/IEC 9797
-
ISO/IEC 9797, Data cryptographic techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1989.
-
(1989)
-
-
-
3
-
-
74049100296
-
-
Federal Information Processing Standard (FIPS) Publication 186-2 Digital Signature Standard (DSS). US/DoC NIST. January 27, 2000. October 5, 2001 a change notice was appended.
-
Federal Information Processing Standard (FIPS) Publication 186-2 Digital Signature Standard (DSS). US/DoC NIST. January 27, 2000. October 5, 2001 a change notice was appended.
-
-
-
-
4
-
-
0347124644
-
-
National Institute of Standards and Technology, version 2, 29 May
-
National Institute of Standards and Technology, "SKIPJACK and KEA Algorithm Specifications", version 2, 29 May 1998.
-
(1998)
SKIPJACK and KEA Algorithm Specifications
-
-
-
5
-
-
0031351741
-
A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation
-
IEEE
-
M. Bellare, A. Desai, E. Jokipii and P. Rogaway, A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation, Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
-
(1997)
Proceedings of the 38th Symposium on Foundations of Computer Science
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
6
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
Rome, Italy July
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001.
-
(2001)
Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
David Culler, J.D.T.4
-
7
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
December
-
Mihir Bellare, Joe Kilian, and Phillip Rogaway. "The security of the cipher block chaining message authentication code". Journal of Computer and System Sciences, 61(3):362-399, December 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
8
-
-
0242656059
-
-
T. Iwata, K. Kurosawa, OMAC: One-Key CBC MAC, in Fast Software Encryption, 10th International Workshop, FSE 2003, Lecture Notes in Computer Science, 2887,Thomas Johansson, ed., Springer-Verlag (2003), p.p. 129-153.
-
T. Iwata, K. Kurosawa, "OMAC: One-Key CBC MAC", in Fast Software Encryption, 10th International Workshop, FSE 2003, Lecture Notes in Computer Science, Vol. 2887,Thomas Johansson, ed., Springer-Verlag (2003), p.p. 129-153.
-
-
-
-
9
-
-
33644943432
-
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
-
NIST
-
NIST, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38B, 2005.
-
(2005)
NIST Special Publication
, vol.800-38B
-
-
-
10
-
-
84974571314
-
CBC MACs for arbitrary-length messages: The three key constructs
-
Advances in Cryptology, CRYPTO 2000, Springer-Verlag
-
J. Black and P. Rogaway. "CBC MACs for arbitrary-length messages: The three key constructs". Advances in Cryptology, CRYPTO 2000, LNCS 1880, pp. 197-215, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 197-215
-
-
Black, J.1
Rogaway, P.2
-
11
-
-
26444574670
-
-
Chris Karlof, Naveen Sastry, David Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
-
Chris Karlof, Naveen Sastry, David Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
-
-
-
-
12
-
-
26444575926
-
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC, Fast Software Encryption, FSE'05
-
J Daemen and V. Rijmen. "A New MAC Construction ALRED and a Specific Instance ALPHA-MAC", Fast Software Encryption, FSE'05, LNCS 3557, pp. 1-17, 2005.
-
(2005)
LNCS
, vol.3557
, pp. 1-17
-
-
Daemen, J.1
Rijmen, V.2
-
13
-
-
33746720876
-
Provably Secure MACs from Dif ferentially-Uniform Permutations and AES-Based Implementations
-
In the Proceedings of FSE
-
K. Minematsu and Y. Tsunoo, "Provably Secure MACs from Dif ferentially-Uniform Permutations and AES-Based Implementations", In the Proceedings of FSE 2006, LNCS 4047, pp. 226-241, 2006.
-
(2006)
LNCS
, vol.4047
, pp. 226-241
-
-
Minematsu, K.1
Tsunoo, Y.2
-
14
-
-
74049110975
-
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
-
Z. Yuan, K. Jia, W. Wang, X. Wang, "Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC", IACR ePrint Archive.
-
IACR ePrint Archive
-
-
Yuan, Z.1
Jia, K.2
Wang, W.3
Wang, X.4
-
16
-
-
0019038335
-
A Cryptanalytic Time-Memory Trade-Off
-
M. E. Hellman. "A Cryptanalytic Time-Memory Trade-Off". In IEEE Transactions on Information Theory, volume 26, pages 401-406, 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, pp. 401-406
-
-
Hellman, M.E.1
-
17
-
-
79251551155
-
The Pelican MAC Function
-
Cryptology ePrint Archive, Report 2005/088
-
Joan Daemen and Vincent Rijmen. "The Pelican MAC Function". Cryptology ePrint Archive, Report 2005/088, 2005.
-
(2005)
-
-
Daemen, J.1
Rijmen, V.2
-
18
-
-
0242656061
-
A concrete security analysis for 3GPP-MAC
-
T. Johansson, editor, Fast Software Encryption, FSE, of, Springer-Verlag, Berlin Germany
-
D. Hong, J-S. Kang, B. Preneel and H. Ryu. "A concrete security analysis for 3GPP-MAC". In T. Johansson, editor, Fast Software Encryption, FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 154-169. Springer-Verlag, Berlin Germany, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2887
, pp. 154-169
-
-
Hong, D.1
Kang, J.-S.2
Preneel, B.3
Ryu, H.4
-
19
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
Eli Biham and Adi Shamir. "Differential cryptanalysis of DES-like cryptosystems", Journal of Cryptology, 4(1):3-72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
20
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Advances in Cryptology-Eurocrypt, of, pages, Springer-Verlag
-
Mitsuru Matsui. "Linear cryptanalysis method for DES cipher", In Advances in Cryptology-Eurocrypt 1993, volume 765 of LNCS, pages386-397. Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
21
-
-
74049104936
-
Square attacks on reduced-round variants of the Skipjack block cipher
-
COSIC Internal Report, January
-
J. Nakahara Jr., B. Preneel and J. Vandewalle, "Square attacks on reduced-round variants of the Skipjack block cipher", COSIC Internal Report, January 2001.
-
(2001)
-
-
Nakahara Jr., J.1
Preneel, B.2
Vandewalle, J.3
-
22
-
-
33750843983
-
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker
-
Proc. of CHES, Springer-Verlag
-
S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, and M. Schimmler. "Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker". In Proc. of CHES 2006, volume 4249, pages 101-118. Springer-Verlag, LNCS, 2006.
-
(2006)
LNCS
, vol.4249
, pp. 101-118
-
-
Kumar, S.1
Paar, C.2
Pelzl, J.3
Pfeiffer, G.4
Schimmler, M.5
|