메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 19-32

On the security of two MAC algorithms

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84947934697     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_3     Document Type: Conference Paper
Times cited : (63)

References (18)
  • 1
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • LNCS 839, Springer-Verlag
    • M. Bellare, J. Kilian, P. Rogaway, "The security of cipher block chaining," Proc.Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 341-358.
    • (1994) Proc.Crypto'94 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 2
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using block ciphers
    • Springer-Verlag
    • M. Bellare, R. Guerin, P. Rogaway, "XOR MACs: new methods for message authentication using block ciphers," Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, pp. 15-28.
    • (1995) Proc. Crypto'95, LNCS 963 , pp. 15-28
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3
  • 6
    • 0346810272 scopus 로고
    • File authentication: A rule for constructing algorithms
    • October 12
    • H. Block, "File authentication: A rule for constructing algorithms," SAKdata Report, October 12, 1983
    • (1983) SAKdata Report
    • Block, H.1
  • 7
    • 84985785183 scopus 로고
    • A message authenticator algorithm suitable for a mainframe computer
    • Springer-Verlag
    • D. Davies, "A message authenticator algorithm suitable for a mainframe computer," Proc. Crypto'84., LNCS 196, Springer-Verlag, 1985, pp. 393-400.
    • (1985) Proc. Crypto'84., LNCS 196 , pp. 393-400
    • Davies, D.1
  • 8
    • 78649262413 scopus 로고
    • The message authenticator algorithm (MAA) and its implementation
    • Feb
    • D. Davies, D.O. Clayden, "The message authenticator algorithm (MAA) and its implementation," NPL Report DITC 109/88, Feb. 1988.
    • (1988) NPL Report DITC 109/88
    • Davies, D.1    Clayden, D.O.2
  • 13
    • 85028754650 scopus 로고
    • The first experimental cryptanalysis of the Data Encryption Standard
    • Springer-Verlag
    • M. Matsui, "The first experimental cryptanalysis of the Data Encryption Standard," Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 1-11.
    • (1994) Proc. Crypto'94, LNCS 839 , pp. 1-11
    • Matsui, M.1
  • 14
    • 51549120471 scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • LNCS 963, Springer-Verlag
    • B. Preneel, P.C. van Oorschot, "MDx-MAC and building fast MACs from hash functions",Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, pp. 1-14.
    • (1995) Proc. Crypto'95 , pp. 1-14
    • Preneel, B.1    van Oorschot, P.C.2
  • 15
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Internet Activities Board, Internet Privacy Task Force, April
    • R.L. Rivest, "The MD5 message-digest algorithm," Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
    • (1992) Request for Comments (RFC) 1321
    • Rivest, R.L.1
  • 16
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • LNCS 963, Springer-Verlag
    • P. Rogaway, "Bucket hashing and its application to fast message authentication",Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, pp. 29-42.
    • (1995) Proc. Crypto'95 , pp. 29-42
    • Rogaway, P.1
  • 18
    • 0347506735 scopus 로고
    • Message authentication with one-way hash functions
    • G. Tsudik, "Message authentication with one-way hash functions," ACM Computer Communications Review, Vol. 22, No. 5, 1992, pp. 29-38.
    • (1992) ACM Computer Communications Review , vol.22 , Issue.5 , pp. 29-38
    • Tsudik, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.