-
1
-
-
84886147999
-
-
3GPP Technical Specification Group Services and System Aspects: (Release 9). Tech. Rep. 3G TS 33.401 V 9.3.1, 3rd Generation Partnership Project (2010-04)
-
3GPP Technical Specification Group Services and System Aspects: 3GPP System Architecture Evolution (SAE); Security architecture (Release 9). Tech. Rep. 3G TS 33.401 V 9.3.1, 3rd Generation Partnership Project (2010-04)
-
3GPP System Architecture Evolution (SAE); Security Architecture
-
-
-
2
-
-
38149125785
-
The Power of Verification Queries in Message Authentication and Authenticated Encryption
-
Tech. Rep. 2004/309, ePrint Archive
-
Bellare, M., Goldreich, O., Mityagin, A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Tech. Rep. 2004/309, Cryptology ePrint Archive (2004)
-
(2004)
Cryptology
-
-
Bellare, M.1
Goldreich, O.2
Mityagin, A.3
-
4
-
-
77956179198
-
-
ETSI/SAGE: Document 1: UEA2 and UIA2 Specification. Version 2.1. Tech. rep., ETSI March 16
-
ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 1: UEA2 and UIA2 Specification. Version 2.1. Tech. rep., ETSI (March 16, 2009), http://www.gsmworld.com/documents/uea2- uia2-d1-v2-1.pdf
-
(2009)
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2
-
-
-
8
-
-
84857740683
-
-
ETSI/SAGE: Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1.5. Tech. rep., ETSI January 4
-
ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1.5. Tech. rep., ETSI (January 4, 2011), http://www.gsmworld.com/documents/EEA3-EIA3-specification-v1-5.pdf
-
(2011)
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
-
-
-
10
-
-
84857740683
-
-
ETSI/SAGE: Document 4: Design and Evaluation Report. Version 1.3, Tech. rep., ETSI January 18
-
ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report. Version 1.3, Tech. rep., ETSI (January 18, 2011), http://www.gsmworld.com/ documents/EEA3-EIA3-Design-Evaluation-v1-3.pdf
-
(2011)
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
-
-
-
11
-
-
51849140875
-
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Handschuh, H., Preneel, B.: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 144-161. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 144-161
-
-
Handschuh, H.1
Preneel, B.2
-
12
-
-
84991939136
-
LFSR-Based Hashing and Authentication
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
14
-
-
84957645558
-
Bucket Hashing and Its Application to Fast Message Authentication
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Rogaway, P.: Bucket Hashing and Its Application to Fast Message Authentication. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 29-42. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
15
-
-
33746021717
-
Bucket Hashing and its Application to Fast Message Authentication
-
Rogaway, P.: Bucket Hashing and its Application to Fast Message Authentication. Journal of Cryptology 12(2), 91-115 (1999)
-
(1999)
Journal of Cryptology
, vol.12
, Issue.2
, pp. 91-115
-
-
Rogaway, P.1
-
16
-
-
84942520895
-
On Fast and Provably Secure Message Authentication Based on Universal Hashing
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Shoup, V.: On Fast and Provably Secure Message Authentication Based on Universal Hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 313-328. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 313-328
-
-
Shoup, V.1
-
17
-
-
0000410707
-
Universal Hashing and Authentication Codes
-
Stinson, D.: Universal Hashing and Authentication Codes. Design, Codes and Cryptography 4, 369-380 (1994)
-
(1994)
Design, Codes and Cryptography
, vol.4
, pp. 369-380
-
-
Stinson, D.1
-
18
-
-
84857733130
-
Preliminary Cryptanalysis Results of ZUC
-
Presented at the
-
Sun, B., Tang, X., Li, C.: Preliminary Cryptanalysis Results of ZUC. Presented at the First International Workshop on ZUC Algorithm, vol. 12 (2010)
-
(2010)
First International Workshop on ZUC Algorithm
, vol.12
-
-
Sun, B.1
Tang, X.2
Li, C.3
-
19
-
-
0019572642
-
New Hash Functions and Their Use in Authentication and Set Equality
-
Wegman, M., Carter, J.: New Hash Functions and Their Use in Authentication and Set Equality. Journal of Computer and System Science 22, 265-279 (1981)
-
(1981)
Journal of Computer and System Science
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
-
20
-
-
84889747727
-
Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3
-
Presented at the
-
Wu, H.: Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3. Presented at the ASIACRYPT 2010 rump session (2010), http://www.spms.ntu.edu.sg/ Asiacrypt2010/ Rump%20Session-%207%20Dec%202010/wu-rump-zuc.pdf
-
ASIACRYPT 2010 Rump Session (2010)
-
-
Wu, H.1
|