-
1
-
-
84983089516
-
The security of cipher block chaining
-
LNCS 839, Springer-Verlag
-
M. Bellare, J. Kilian, P. Rogaway, "The security of cipher block chaining," Proc.Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 341-358.
-
(1994)
Proc.Crypto'94
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
84954417747
-
XOR MACs: New methods for message authentication using block ciphers
-
Springer-Verlag
-
M. Bellare, R. Guerin, P. Rogaway, "XOR MACs: new methods for message authentication using block ciphers," Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, pp. 15-28.
-
(1995)
Proc. Crypto'95, LNCS 963
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
6
-
-
0346810272
-
File authentication: A rule for constructing algorithms
-
October 12
-
H. Block, "File authentication: A rule for constructing algorithms," SAKdata Report, October 12, 1983
-
(1983)
SAKdata Report
-
-
Block, H.1
-
7
-
-
84985785183
-
A message authenticator algorithm suitable for a mainframe computer
-
Springer-Verlag
-
D. Davies, "A message authenticator algorithm suitable for a mainframe computer," Proc. Crypto'84., LNCS 196, Springer-Verlag, 1985, pp. 393-400.
-
(1985)
Proc. Crypto'84., LNCS 196
, pp. 393-400
-
-
Davies, D.1
-
8
-
-
78649262413
-
The message authenticator algorithm (MAA) and its implementation
-
Feb
-
D. Davies, D.O. Clayden, "The message authenticator algorithm (MAA) and its implementation," NPL Report DITC 109/88, Feb. 1988.
-
(1988)
NPL Report DITC 109/88
-
-
Davies, D.1
Clayden, D.O.2
-
10
-
-
85033142181
-
-
8731, IS 8731-2
-
ISO 8731:1987,Banking-approved algorithms for message authentication, Part 1, DEA, IS 8731-1,Part 2, Message Authentication Algorithm (MAA), IS 8731-2.
-
(1987)
Banking-approved algorithms for message authentication, Part 1, DEA, IS 8731-1, Part 2, Message Authentication Algorithm (MAA)
-
-
ISO1
-
12
-
-
0006595839
-
Message authentication with MD5
-
Spring
-
B. Kaliski, M. Robshaw, "Message authentication with MD5," CryptoBytes (RSA Laboratories Technical Newsletter), Vol. 1, No. 1, Spring 1995, pp. 5-8.
-
(1995)
CryptoBytes (RSA Laboratories Technical Newsletter)
, vol.1
, Issue.1
, pp. 5-8
-
-
Kaliski, B.1
Robshaw, M.2
-
13
-
-
85028754650
-
The first experimental cryptanalysis of the Data Encryption Standard
-
Springer-Verlag
-
M. Matsui, "The first experimental cryptanalysis of the Data Encryption Standard," Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 1-11.
-
(1994)
Proc. Crypto'94, LNCS 839
, pp. 1-11
-
-
Matsui, M.1
-
14
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
LNCS 963, Springer-Verlag
-
B. Preneel, P.C. van Oorschot, "MDx-MAC and building fast MACs from hash functions",Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, pp. 1-14.
-
(1995)
Proc. Crypto'95
, pp. 1-14
-
-
Preneel, B.1
van Oorschot, P.C.2
-
15
-
-
0003195066
-
The MD5 message-digest algorithm
-
Internet Activities Board, Internet Privacy Task Force, April
-
R.L. Rivest, "The MD5 message-digest algorithm," Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
Request for Comments (RFC) 1321
-
-
Rivest, R.L.1
-
16
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
LNCS 963, Springer-Verlag
-
P. Rogaway, "Bucket hashing and its application to fast message authentication",Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, pp. 29-42.
-
(1995)
Proc. Crypto'95
, pp. 29-42
-
-
Rogaway, P.1
-
18
-
-
0347506735
-
Message authentication with one-way hash functions
-
G. Tsudik, "Message authentication with one-way hash functions," ACM Computer Communications Review, Vol. 22, No. 5, 1992, pp. 29-38.
-
(1992)
ACM Computer Communications Review
, vol.22
, Issue.5
, pp. 29-38
-
-
Tsudik, G.1
|