-
3
-
-
84983089516
-
The security of cipher block chaining
-
Yvo G. Desmedt, editor, Springer-Verlag, 21-25 August
-
Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of cipher block chaining. In Yvo G. Desmedt, editor, Advances in Cryptology-CRYPTO’94, volume 839of Lecture Notes in Computer Science, pages 341-358. Springer-Verlag, 21-25 August 1994.
-
(1994)
Advances in Cryptology-CRYPTO’94, Volume 839Of Lecture Notes in Computer Science
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
6
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
M. Wiener, editor, of Springer-Verlag, pages, August 1999. Full version can be found at
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: fast and secure message authentication. In M. Wiener, editor, Proc. CRYPTO99, volume 1666 of Springer-Verlag, pages 216-233, August 1999. Full version can be found at: http://www.cs.ucdavis.edu/˜rogaway/umac.
-
Proc. CRYPTO99
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
8
-
-
0018456171
-
Universal classes of hash functions
-
April
-
J. L. Carter and M. N. Wegman. Universal classes of hash functions. JCSS, 18(2):143-154, April 1979.
-
(1979)
JCSS
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
10
-
-
1942530977
-
A construction of a cipher from a single pseudorandom permutation
-
Summer
-
Shimon Even and Yishay Mansour. A construction of a cipher from a single pseudorandom permutation. Journal of Cryptology, 10(3):151-162, Summer 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 151-162
-
-
Even, S.1
Mansour, Y.2
-
11
-
-
0001820140
-
Cryptography and computer privacy
-
May
-
H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, May 1973.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
12
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792-807, October 1984.
-
(1984)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
0023984964
-
How to construct pseudorandom permutations and pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations and pseudorandom functions. SIAM J. Computing, 17(2):373-386, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
15
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
Preliminary version in: Proc. STOC 97
-
M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. J. of Cryptology, 12:29-66, 1999. Preliminary version in: Proc. STOC 97.
-
(1999)
J. Of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
16
-
-
84974535028
-
-
FIPS publication 46: Data encryption standard, 1977. Federal Information Processing Standards Publication 46
-
National Bureau of Standards. FIPS publication 46: Data encryption standard, 1977. Federal Information Processing Standards Publication 46.
-
-
-
-
17
-
-
84974603111
-
-
Advanced encryption standard home page
-
National Institute of Standards and Technology. Advanced encryption standard home page. http://www.nist.gov/aes.
-
-
-
-
20
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
Springer-Verlag
-
P. Rogaway. Bucket hashing and its application to fast message authentication. In Proc. CRYPTO95, Lecture Notes in Computer Science. Springer-Verlag, 1995.
-
(1995)
Proc. CRYPTO95, Lecture Notes in Computer Science
-
-
Rogaway, P.1
-
22
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
June
-
Mark N. Wegman and J. Lawrence Carter. New hash functions and their use in authentication and set equality. JCSS, 22(3):265-279, June 1981.
-
(1981)
JCSS
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Lawrence Carter, J.2
|