-
1
-
-
35048891868
-
Keying hash functions for message authentication
-
Lecture Notes in Computer Science, Springer-Verlag, Available at
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Advances in Cryptology – CRYPTO ’96. Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, pp. 1–15, 1996. Available at URL www-cse.ucsd.edu/users/mihir
-
(1996)
Advances in Cryptology – CRYPTO ’96
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
Lecture Notes in Computer Science, Springer-Verlag, Available at
-
M. Bellare, R. Guerin and P. Rogaway. “XOR MACs: New methods for message authentication using finite pseudorandom functions.” Advances in Cryptology – CRYPTO ’95. Lecture Notes in Computer Science, vol. 963, Springer-Verlag, pp. 15–28, 1995. Available at URL www.cs.ucdavis.edu/∼rogaway
-
(1995)
Advances in Cryptology – CRYPTO ’95
, vol.963
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
4
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Dec, Full version of paper from, Advances in Cryptology –CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, pp. 340–358, 1994.) Available at
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, vol. 61, no. 3, Dec 2000. (Full version of paper from Advances in Cryptology –CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, pp. 340–358, 1994.) Available at URL www.cs.ucdavis.edu/∼rogaway
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
5
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption
-
Lecture Notes in Computer Science, Springer-Verlag, Available at
-
M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient encryption. Advances in Cryptology – ASIACRYPT ’00. Lecture Notes in Computer Science, vol. 1976, Springer-Verlag, 2000. Available at URL www.cs.ucdavis.edu/∼rogaway
-
(2000)
Advances in Cryptology – ASIACRYPT ’00
, vol.1976
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
5644280926
-
-
Final report of RACE integrity primitives evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science, Springer-Verlag
-
A. Berendschot, B. den Boer, J.P. Boly, A. Bosselaers, J. Brandt, D. Chaum, I. Damgård, M. Dichtl, W. Fumy, M. van der Ham, C.J.A. Jansen, P. Landrock, B. Preneel, G. Roelofsen, P. de Rooij, and J. Vandewalle. Integrity primitives for secure information systems, Final report of RACE integrity primitives evaluation (RIPE-RACE 1040). Lecture Notes in Computer Science, vol. 1007, Springer-Verlag, 1995.
-
(1995)
Integrity Primitives for Secure Information Systems
, vol.1007
-
-
Berendschot, A.1
Den Boer, B.2
Boly, J.P.3
Bosselaers, A.4
Brandt, J.5
Chaum, D.6
Damgård, I.7
Dichtl, M.8
Fumy, W.9
Van Der Ham, M.10
Jansen, C.11
Landrock, P.12
Preneel, B.13
Roelofsen, G.14
De Rooij, P.15
Vandewalle, J.16
-
8
-
-
33645601628
-
How to stretch random functions: The security of protected counter sums
-
Available at
-
D. Bernstein. How to stretch random functions: the security of protected counter sums. Journal of Cryptology, vol. 12, no. 3, pp. 185–192 (1999). Available at URL cr.yp.to/djb.html
-
(1999)
Journal of Cryptology
, vol.12
, Issue.3
, pp. 185-192
-
-
Bernstein, D.1
-
9
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Lecture Notes in Computer Science, Springer-Verlag, Available at
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. Advances in Cryptology – CRYPTO ’99. Lecture Notes in Computer Science, Springer-Verlag, 1999. Available at URL www.cs.ucdavis.edu/∼rogaway
-
(1999)
Advances in Cryptology – CRYPTO ’99
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
11
-
-
84974571314
-
CBC MACs for arbitrary-length messages: The three-key constructions
-
Lecture Notes in Computer Science, Available at
-
J. Black and P. Rogaway. CBC MACs for arbitrary-length messages: The three-key constructions. Full version of paper from Advances in Cryptology –CRYPTO ’00. Lecture Notes in Computer Science, vol. 1880, pp. 197–215, 2000. Available at URL www.cs.ucdavis.edu/∼rogaway
-
(2000)
Full Version of Paper From
, vol.1880
, pp. 197-215
-
-
Black, J.1
Rogaway, P.2
-
12
-
-
0020913618
-
On computationally secure authentication tags requiring short secret shared keys
-
Plenum Press
-
G. Brassard. On computationally secure authentication tags requiring short secret shared keys. Advances in Cryptology – CRYPTO ’82. Plenum Press, pp. 79–86, 1983.
-
(1983)
Advances in Cryptology – CRYPTO ’82
, pp. 79-86
-
-
Brassard, G.1
-
14
-
-
0010276081
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
Springer-Verlag, April, Available at
-
V. Gligor and P. Donescu. Fast encryption and authentication: XCBC encryption and XECB authentication modes. Fast Software Encryption, Lecture Notes in Computer Science, Springer-Verlag, April 2001. Available at URL www.eng.umd.edu/∼gligor
-
(2001)
Fast Software Encryption, Lecture Notes in Computer Science
-
-
Gligor, V.1
Donescu, P.2
-
15
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, vol. 33, no. 4, pp. 210–217, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
16
-
-
84942522751
-
MMH: Software message authentication in the Gbit/second rates
-
Lecture Notes in Computer Science, Springer-Verlag, Available at
-
S. Halevi and H. Krawczyk. MMH: Software message authentication in the Gbit/second rates. Fast Software Encryption (FSE 4), Lecture Notes in Computer Science, vol. 1267, Springer-Verlag, pp. 172–189, 1997. Available at URL www.research.ibm.com/people/s/shaih
-
(1997)
Fast Software Encryption (FSE 4)
, vol.1267
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
17
-
-
84947283808
-
-
Iso/Iec 9797, Information technology – Security techniques – Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards (ISO), Geneva, Switzerland, second edition
-
Iso/Iec 9797. Information technology – Security techniques – Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards (ISO), Geneva, Switzerland, 1994 (second edition).
-
(1994)
-
-
-
18
-
-
84945137421
-
Encryption modes with almost free message integrity
-
Lecture Notes in Computer Science, B. Pfitzmann, ed., Springer-Verlag
-
C. Jutla. Encryption modes with almost free message integrity. Advances in Cryptology – EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045, B. Pfitzmann, ed., Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology – EUROCRYPT 2001
, vol.2045
-
-
Jutla, C.1
-
19
-
-
84991939136
-
LFSR-based hashing and authentication
-
Lecture Notes in Computer Science, Springer-Verlag
-
H. Krawczyk. LFSR-based hashing and authentication. Advances in Cryptology – CRYPTO ’94. Lecture Notes in Computer Science, vol. 839, Springer-Verlag, pp 129–139, 1994.
-
(1994)
Advances in Cryptology – CRYPTO ’94
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
20
-
-
84947235448
-
-
Personal communication, July, Further information available at
-
H. Lipmaa. Personal communication, July 2001. Further information available at www.tcs.hut.fi/∼helger
-
(2001)
-
-
Lipmaa, H.1
-
21
-
-
0004775324
-
CBC MAC for real-time data sources
-
Nov, Available at, Earlier version as 1997/010 in the Cryptology ePrint archive, eprint.iacr.org
-
E. Petrank and C. Rackoff. CBC MAC for real-time data sources. Journal of Cryptology, vol. 13, no. 3, pp. 315–338, Nov 2000. Available at URL www.cs.technion.ac.il/∼erez/publications.html. Earlier version as 1997/010 in the Cryptology ePrint archive, eprint.iacr.org
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 315-338
-
-
Petrank, E.1
Rackoff, C.2
-
22
-
-
84979021449
-
Cryptographic primitives for information authentication – State of the art
-
LNCS 1528, B. Preneel and V. Rijmen, eds., Springer-Verlag
-
B. Preneel. Cryptographic primitives for information authentication – State of the art. State of the Art in Applied Cryptography, COSIC ’97, LNCS 1528, B. Preneel and V. Rijmen, eds., Springer-Verlag, pp. 49–104, 1998.
-
State of the Art in Applied Cryptography, COSIC ’97
, pp. 49-104
-
-
Preneel, B.1
-
23
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and L. Carter. New hash functions and their use in authentication and set equality. J. of Comp. and System Sciences. vol. 22, pp. 265–279, 1981.
-
(1981)
J of Comp and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
|