-
2
-
-
84957098723
-
Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier
-
Springer
-
M. Bellare, O. Goldreich, and H. Krawczyk.: Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier. In CRYPTO’99, volume 1666 of LNCS, pages 270-287. Springer, 1999.
-
(1999)
CRYPTO’99, Volume 1666 of LNCS
, pp. 270-287
-
-
Bellare, M.1
Goldreich, O.2
Krawczyk, H.3
-
3
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
Springer-Verlag
-
M. Bellare, R. Guerin, and P. Rogaway.: XOR MACs: New methods for message authentication using finite pseudorandom functions. In CRYPTO’95, volume 963 of LNCS, pages 15-28. Springer-Verlag, 1995.
-
(1995)
CRYPTO’95, Volume 963 of LNCS
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
4
-
-
0003372190
-
The security of the cipher block chaining message authentication code
-
Springer
-
M. Bellare, J. Killian, and P. Rogaway. The security of the cipher block chaining message authentication code. In CRYPTO’94, volume 839 of LNCS, pages 341-358. Springer, 1994. See new version at http://www.cs.ucdavis.edu/rogaway/.
-
(1994)
CRYPTO’94, Volume 839 of LNCS
, pp. 341-358
-
-
Bellare, M.1
Killian, J.2
Rogaway, P.3
-
5
-
-
84957701229
-
Luby-rackoff backwards: Increasing security by making block-ciphers non-invertible
-
Springer
-
M. Bellare, T. Krovetz, and P. Rogaway. Luby-rackoff backwards: increasing security by making block-ciphers non-invertible. In EUROCRYPT’98, volume 1403 of LNCS, pages 266-280. Springer, 1998.
-
(1998)
EUROCRYPT’98, Volume 1403 of LNCS
, pp. 266-280
-
-
Bellare, M.1
Krovetz, T.2
Rogaway, P.3
-
6
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Springer-Verlag
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway.: UMAC: Fast and secure message authentication. In CRYPTO’99, volume 1666 of LNCS, pages 216-233. Springer-Verlag, 1999.
-
(1999)
CRYPTO’99, Volume 1666 of LNCS
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
7
-
-
84974571314
-
CBC MACs for arbitrary-length messages: The three-key constructions
-
Springer
-
J. Black and P. Rogaway.: CBC MACs for arbitrary-length messages: The three-key constructions. In CRYPTO 2000, volume 1880 of LNCS, pages 197-215. Springer, 2000.
-
(2000)
CRYPTO 2000, Volume 1880 of LNCS
, pp. 197-215
-
-
Black, J.1
Rogaway, P.2
-
8
-
-
84957669090
-
Building PRFs from PRPs
-
Springer
-
C. Hall, D. Wagner, J. Kelsey, and B. Schneier. Building PRFs from PRPs. In CRYPTO’98, volume 1462 of LNCS, pages 370-389. Springer, 1998.
-
(1998)
CRYPTO’98, Volume 1462 of LNCS
, pp. 370-389
-
-
Hall, C.1
Wagner, D.2
Kelsey, J.3
Schneier, B.4
-
9
-
-
85018971755
-
Information Technology - Security Techniques
-
International Organization for Standards, Geneva, Switzerland. ISO/IEC 9797-1, second edition edition
-
International Organization for Standards, Geneva, Switzerland. ISO/IEC 9797-1. Information Technology - Security Techniques - Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, second edition edition, 1999.
-
(1999)
Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm
-
-
-
12
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
Springer
-
B. Preneel and P. van Oorschot. MDx-MAC and building fast MACs from hash functions. In CRYPTO’95, volume 963 of LNCS, pages 1-14. Springer, 1995.
-
(1995)
CRYPTO’95, Volume 963 of LNCS
, pp. 1-14
-
-
Preneel, B.1
Van Oorschot, P.2
-
13
-
-
38349012062
-
L-collision attacks against randomized MACs
-
Springer
-
M. Semanko. L-collision attacks against randomized MACs. In CRYPTO 2000, volume 1880 of LNCS, pages 216-228. Springer, 2000.
-
(2000)
CRYPTO 2000, Volume 1880 of LNCS
, pp. 216-228
-
-
Semanko, M.1
-
14
-
-
84949437889
-
National Technical Information Service, Springfield, Virginia. FIPS 113. Computer Data Authentication
-
U.S. Department of Commerce/National Bureau of Standards
-
U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia. FIPS 113. Computer Data Authentication. Federal Information Processing Standards Publication 113, 1994.
-
(1994)
Federal Information Processing Standards Publication
, pp. 113
-
-
-
15
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
|