메뉴 건너뛰기




Volumn 1666, Issue , 1999, Pages 216-233

UMAC: Fast and secure message authentication

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS;

EID: 84957068240     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48405-1_14     Document Type: Conference Paper
Times cited : (248)

References (28)
  • 2
    • 85056960014 scopus 로고
    • American national standard - Financial institution message authentication (Wholesale)
    • Ansi X9.9
    • Ansi X9.9. American national standard - Financial institution message authentication (wholesale). ASC X9 Secretariat - American Bankers Association, 1986.
    • (1986) ASC X9 Secretariat - American Bankers Association
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Bellare, M., Canetti, R., and Krawczyk, H. Keying hash functions for message authentication. In Advances in Cryptology - CRYPTO '96 (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp 15.
    • (1996) Advances in Cryptology - CRYPTO '96 , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Bellare, M., Kilian, J., and Rogaway, P. The security of cipher block chaining. In Advances in Cryptology - CRYPTO '94. (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp 341-358.
    • (1994) Advances in Cryptology - CRYPTO '94 , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 8
    • 0010020069 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • Lecture Notes in Computer Science, Springer-Verlag. Full version of this paper, available at
    • Black, J., Halevi, S., Krawczyk, H., Krovetz, T., and Rogaway, P. UMAC: Fast and secure message authentication. In Advances in Cryptology - CRYPTO '99. (1999), Lecture Notes in Computer Science, Springer-Verlag. Full version of this paper, available at www.cs.ucdavis.edu/~rogaway/umac.
    • (1999) Advances in Cryptology - CRYPTO '99
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 9
    • 0020913618 scopus 로고
    • On computationally secure authentication tags requiring short secret shared keys
    • Springer-Verlag
    • Brassard, G. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology - CRYPTO '82. (1983), Springer-Verlag, pp 79-86.
    • (1983) Advances in Cryptology - CRYPTO '82 , pp. 79-86
    • Brassard, G.1
  • 11
    • 0003629991 scopus 로고
    • FIPS 180-1, NIST, US Dept. Of Commerce
    • FIPS 180-1. Secure hash standard. NIST, US Dept. Of Commerce, 1995.
    • (1995) Secure Hash Standard
  • 12
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed hashing for message authentication
    • H. Krawczyk, M. B., and Canetti, R. HMAC: Keyed hashing for message authentication. IETF RFC-2104, 1997.
    • (1997) IETF RFC-2104
    • Krawczyk, H.M.B.1    Canetti, R.2
  • 13
  • 14
    • 21744434823 scopus 로고    scopus 로고
    • Bucket hashing with small key size
    • Lecture Notes in Computer Science, Springer-Verlag
    • Johansson, T. Bucket hashing with small key size. In Advances in Cryptology - EUROCRYPT '97. (1997), Lecture Notes in Computer Science, Springer-Verlag.
    • (1997) Advances in Cryptology - EUROCRYPT '97
    • Johansson, T.1
  • 16
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Krawczyk, H. LFSR-based hashing and authentication. In Advances in Cryptology - CRYPTO '94. (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp 129-139.
    • (1994) Advances in Cryptology - CRYPTO '94 , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 19
    • 84957663269 scopus 로고    scopus 로고
    • Software performance of universal hash functions
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Nevelsteen, W., and Preneel, B. Software performance of universal hash functions. In Advances in Cryptology | EUROCRYPT '99 (1999), vol. 1592 of Lecture Notes in Computer Science, Springer-Verlag, pp 24-41.
    • (1999) Advances in Cryptology | EUROCRYPT '99 , vol.1592 , pp. 24-41
    • Nevelsteen, W.1    Preneel, B.2
  • 20
    • 0012022743 scopus 로고    scopus 로고
    • Square hash: Fast message authentication via optimized universal hash functions
    • Lecture Notes in Computer Science, Springer-Verlag
    • Patel, S., and Ramzan, Z. Square hash: Fast message authentication via optimized universal hash functions. In Advances in Cryptology - CRYPTO '99 (1999), Lecture Notes in Computer Science, Springer-Verlag.
    • (1999) Advances in Cryptology - CRYPTO '99
    • Patel, S.1    Ramzan, Z.2
  • 22
    • 51549120471 scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Preneel, B., and van Oorschot, P. MDx-MAC and building fast MACs from hash functions. In Advances in Cryptology - CRYPTO '95 (1995), vol. 963 of Lecture Notes in Computer Science, Springer-Verlag, pp 4.
    • (1995) Advances in Cryptology - CRYPTO '95 , vol.963
    • Preneel, B.1    Van Oorschot, P.2
  • 23
    • 84947934697 scopus 로고    scopus 로고
    • On the security of two MAC algorithms
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Preneel, B., and van Oorschot, P. On the security of two MAC algorithms. In Advances in Cryptology - EUROCRYPT '96. (1996), vol. 1070 of Lecture Notes in Computer Science, Springer-Verlag, pp 19-32.
    • (1996) Advances in Cryptology - EUROCRYPT '96 , vol.1070 , pp. 19-32
    • Preneel, B.1    Van Oorschot, P.2
  • 25
    • 0012086874 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Rogaway, P. Bucket hashing and its application to fast message authentication. In Advances in Cryptology - CRYPTO '95. (1995), vol. 963 of Lecture Notes in Computer Science, Springer-Verlag, pp 313-328.
    • (1995) Advances in Cryptology - CRYPTO '95 , vol.963 , pp. 313-328
    • Rogaway, P.1
  • 26
    • 0003239571 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Shoup, V. On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology - CRYPTO '96. (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp 74-85.
    • (1996) Advances in Cryptology - CRYPTO '96 , vol.1109 , pp. 74-85
    • Shoup, V.1
  • 27
    • 0026973508 scopus 로고
    • Message authentication with one-way hash functions
    • IEEE Press
    • Tsudik, G. Message authentication with one-way hash functions. In Proceedings of Infocom '92. (1992), IEEE Press.
    • (1992) Proceedings of Infocom '92
    • Tsudik, G.1
  • 28
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M., and Carter, L. New hash functions and their use in authentication and set equality. In J. Of Comp. And System Sciences (1981), vol. 22, pp 265-279.
    • (1981) In J. Of Comp. And System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.