-
2
-
-
84983089516
-
The security of the cipher block chaining message authentication code
-
Older version appears, Springer-Verlag
-
Bellare, M., Kilian, J., and Rogaway, P. The security of the cipher block chaining message authentication code. See www.cs.ucdavis.edu/˜rogaway. Older version appears in Advances in Cryptology-CRYPTO ’94 (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp. 341-358.
-
Advances in Cryptology-Crypto ’94 (1994), Vol. 839 of Lecture Notes in Computer Science
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
3
-
-
5644280926
-
-
Springer-Verlag
-
Berendschot, A., den Boer, B., Boly, J., Bosselaers, A., Brandt, J., Chaum, D., Damgård, I., Dichtl, M., Fumy, W., van der Ham, M., Jansen, C., Landrock, P., Preneel, B., Roelofsen, G., de Rooij, P., and Vandewalle, J. Final Report of Race Integrity Primitives, vol. 1007 of Lecture Notes in Computer Science. Springer-Verlag, 1995.
-
(1995)
Final Report of Race Integrity Primitives, Vol. 1007 of Lecture Notes in Computer Science
-
-
Berendschot, A.1
Den Boer, B.2
Boly, J.3
Bosselaers, A.4
Brandt, J.5
Chaum, D.6
Damgård, I.7
Dichtl, M.8
Fumy, W.9
Van Der Ham, M.10
Jansen, C.11
Landrock, P.12
Preneel, B.13
Roelofsen, G.14
De Rooij, P.15
Vandewalle, J.16
-
4
-
-
0010020069
-
UMAC: Fast and secure message authentication
-
Lecture Notes in Computer Science, Springer-Verlag
-
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., and Rogaway, P. UMAC: Fast and secure message authentication. In Advances in Cryptology-CRYPTO ’99 (1999), Lecture Notes in Computer Science, Springer-Verlag.
-
(1999)
Advances in Cryptology-Crypto ’99
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
6
-
-
33745748352
-
-
Federal Information Processing Standards Publication 113, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia
-
FIPS 113. Computer data authentication. Federal Information Processing Standards Publication 113, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1994.
-
(1994)
Computer Data Authentication
-
-
-
7
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., and Micali, S. How to construct random functions. Journal of the ACM 33, 4 (1986), 210-217.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
11844299351
-
Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm
-
Iso/Iec 9797-1, Geneva, Switzerland, Second edition
-
Iso/Iec 9797-1. Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards, Geneva, Switzerland, 1999. Second edition.
-
(1999)
International Organization for Standards
-
-
-
9
-
-
84955573096
-
How to protect DES against exhaustive key search
-
Springer-Verlag
-
Kilian, J., and Rogaway, P. How to protect DES against exhaustive key search. In Advances in Cryptology-CRYPTO ’96 (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp. 252-267.
-
Advances in Cryptology-Crypto ’96 (1996), Vol. 1109 of Lecture Notes in Computer Science
, pp. 252-267
-
-
Kilian, J.1
Rogaway, P.2
-
11
-
-
84947934697
-
On the security of two MAC algorithms
-
Springer-Verlag
-
Preneel, B., and van Oorschot, P. On the security of two MAC algorithms. In Advances in Cryptology - EUROCRYPT ’96 (1996), vol. 1070 of Lecture Notes in Computer Science, Springer-Verlag, pp. 19-32.
-
Advances in Cryptology - EUROCRYPT ’96 (1996), Vol. 1070 of Lecture Notes in Computer Science
, pp. 19-32
-
-
Preneel, B.1
Van Oorschot, P.2
-
12
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M., and Carter, L. New hash functions and their use in authentication and set equality. In J. of Comp. and System Sciences (1981), vol. 22, pp. 265-279.
-
(1981)
In J. of Comp. and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
|