메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 197-215

CBC MACs for arbitrary-length messages: The three-key constructions

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84974571314     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_12     Document Type: Conference Paper
Times cited : (124)

References (12)
  • 6
    • 33745748352 scopus 로고
    • Federal Information Processing Standards Publication 113, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia
    • FIPS 113. Computer data authentication. Federal Information Processing Standards Publication 113, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1994.
    • (1994) Computer Data Authentication
  • 8
    • 11844299351 scopus 로고    scopus 로고
    • Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm
    • Iso/Iec 9797-1, Geneva, Switzerland, Second edition
    • Iso/Iec 9797-1. Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards, Geneva, Switzerland, 1999. Second edition.
    • (1999) International Organization for Standards
  • 12
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M., and Carter, L. New hash functions and their use in authentication and set equality. In J. of Comp. and System Sciences (1981), vol. 22, pp. 265-279.
    • (1981) In J. of Comp. and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.