메뉴 건너뛰기




Volumn 2365, Issue , 2002, Pages 237-251

On the security of randomized CBC-MAC beyond the birthday paradox limit a new construction

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84949450111     PISSN: 03029743     EISSN: 16113349     Source Type: Journal    
DOI: 10.1007/3-540-45661-9_19     Document Type: Article
Times cited : (57)

References (15)
  • 2
    • 84957098723 scopus 로고    scopus 로고
    • Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier
    • Springer
    • M. Bellare, O. Goldreich, and H. Krawczyk.: Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier. In CRYPTO’99, volume 1666 of LNCS, pages 270-287. Springer, 1999.
    • (1999) CRYPTO’99, Volume 1666 of LNCS , pp. 270-287
    • Bellare, M.1    Goldreich, O.2    Krawczyk, H.3
  • 3
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using finite pseudorandom functions
    • Springer-Verlag
    • M. Bellare, R. Guerin, and P. Rogaway.: XOR MACs: New methods for message authentication using finite pseudorandom functions. In CRYPTO’95, volume 963 of LNCS, pages 15-28. Springer-Verlag, 1995.
    • (1995) CRYPTO’95, Volume 963 of LNCS , pp. 15-28
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3
  • 4
    • 0003372190 scopus 로고
    • The security of the cipher block chaining message authentication code
    • Springer
    • M. Bellare, J. Killian, and P. Rogaway. The security of the cipher block chaining message authentication code. In CRYPTO’94, volume 839 of LNCS, pages 341-358. Springer, 1994. See new version at http://www.cs.ucdavis.edu/rogaway/.
    • (1994) CRYPTO’94, Volume 839 of LNCS , pp. 341-358
    • Bellare, M.1    Killian, J.2    Rogaway, P.3
  • 5
    • 84957701229 scopus 로고    scopus 로고
    • Luby-rackoff backwards: Increasing security by making block-ciphers non-invertible
    • Springer
    • M. Bellare, T. Krovetz, and P. Rogaway. Luby-rackoff backwards: increasing security by making block-ciphers non-invertible. In EUROCRYPT’98, volume 1403 of LNCS, pages 266-280. Springer, 1998.
    • (1998) EUROCRYPT’98, Volume 1403 of LNCS , pp. 266-280
    • Bellare, M.1    Krovetz, T.2    Rogaway, P.3
  • 7
    • 84974571314 scopus 로고    scopus 로고
    • CBC MACs for arbitrary-length messages: The three-key constructions
    • Springer
    • J. Black and P. Rogaway.: CBC MACs for arbitrary-length messages: The three-key constructions. In CRYPTO 2000, volume 1880 of LNCS, pages 197-215. Springer, 2000.
    • (2000) CRYPTO 2000, Volume 1880 of LNCS , pp. 197-215
    • Black, J.1    Rogaway, P.2
  • 9
    • 85018971755 scopus 로고    scopus 로고
    • Information Technology - Security Techniques
    • International Organization for Standards, Geneva, Switzerland. ISO/IEC 9797-1, second edition edition
    • International Organization for Standards, Geneva, Switzerland. ISO/IEC 9797-1. Information Technology - Security Techniques - Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, second edition edition, 1999.
    • (1999) Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm
  • 12
    • 51549120471 scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • Springer
    • B. Preneel and P. van Oorschot. MDx-MAC and building fast MACs from hash functions. In CRYPTO’95, volume 963 of LNCS, pages 1-14. Springer, 1995.
    • (1995) CRYPTO’95, Volume 963 of LNCS , pp. 1-14
    • Preneel, B.1    Van Oorschot, P.2
  • 13
    • 38349012062 scopus 로고    scopus 로고
    • L-collision attacks against randomized MACs
    • Springer
    • M. Semanko. L-collision attacks against randomized MACs. In CRYPTO 2000, volume 1880 of LNCS, pages 216-228. Springer, 2000.
    • (2000) CRYPTO 2000, Volume 1880 of LNCS , pp. 216-228
    • Semanko, M.1
  • 14
    • 84949437889 scopus 로고
    • National Technical Information Service, Springfield, Virginia. FIPS 113. Computer Data Authentication
    • U.S. Department of Commerce/National Bureau of Standards
    • U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia. FIPS 113. Computer Data Authentication. Federal Information Processing Standards Publication 113, 1994.
    • (1994) Federal Information Processing Standards Publication , pp. 113
  • 15
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.1    Carter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.