-
1
-
-
0012983374
-
Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC
-
NIST
-
NIST: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. NIST Special Publication 800-38D (2007)
-
(2007)
NIST Special Publication 800-38D
-
-
-
2
-
-
84965066515
-
The advanced encryption standard (AES)
-
NIST
-
NIST: The advanced encryption standard (AES). FIPS Publication 197 (2001)
-
(2001)
FIPS Publication 197
-
-
-
3
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22, 265-279 (1981)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
9
-
-
0013259203
-
A simple and key-economical unconditional authentication scheme
-
den Boer, B.: A simple and key-economical unconditional authentication scheme. Journal of Computer Security 2, 65-71 (1993)
-
(1993)
Journal of Computer Security
, vol.2
, pp. 65-71
-
-
Den Boer, B.1
-
10
-
-
84898476212
-
An Integrity Check Value Algorithm for Stream Ciphers
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Taylor, R.: An Integrity Check Value Algorithm for Stream Ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 40-48. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 40-48
-
-
Taylor, R.1
-
11
-
-
84974696785
-
On Families of Hash Functions via Geometric Codes and Concatenation
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On Families of Hash Functions via Geometric Codes and Concatenation. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 331-342. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
12
-
-
24944476633
-
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Bernstein, D.J.: Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 164-180. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 164-180
-
-
Bernstein, D.J.1
-
13
-
-
26444458893
-
The Poly1305-AES Message-Authentication Code
-
Gilbert, H., Handschuh, H. (eds.) FSE 2005. Springer, Heidelberg
-
Bernstein, D.J.: The Poly1305-AES Message-Authentication Code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32-49. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3557
, pp. 32-49
-
-
Bernstein, D.J.1
-
14
-
-
79952185079
-
A trade-off between collision probability and key size in universal hashing using polynomials
-
Sarkar, P.: A trade-off between collision probability and key size in universal hashing using polynomials. Designs, Codes and Cryptography 58(3), 271-278 (2011)
-
(2011)
Designs, Codes and Cryptography
, vol.58
, Issue.3
, pp. 271-278
-
-
Sarkar, P.1
-
15
-
-
84918495938
-
Authentication failures in NIST version of GCM
-
Joux, A.: Authentication failures in NIST version of GCM. NIST Comment (2006)
-
(2006)
NIST Comment
-
-
Joux, A.1
-
16
-
-
51849140875
-
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Handschuh, H., Preneel, B.: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 144-161. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 144-161
-
-
Handschuh, H.1
Preneel, B.2
-
17
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig, S., Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24(1), 106-110 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
18
-
-
84866636001
-
Authentication weaknesses in GCM
-
May
-
Ferguson, N.: Authentication weaknesses in GCM. NIST Comment (May 2005)
-
(2005)
NIST Comment
-
-
Ferguson, N.1
|