A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier (Q3627438): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4941859 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-Property-Preserving Hash Domain Extension and the EMD Transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Indifferentiability Security Analysis of chopMD Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Random Oracle Model and the Ideal Cipher Model Are Equivalent / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feistel Networks Made Public, and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Mode of Operation for Block Ciphers and Length-Preserving MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Variant of the Merkle-Damgård Scheme with a Permutation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046361 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Failure-Friendly Design Principle for Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Domain Extension of Public Random Functions: Beyond the Birthday Barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Benes Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343417 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of iterated message authentication codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multilane HMAC— Security beyond the Birthday Limit / rank
 
Normal rank
Property / cites work
 
Property / cites work: A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier / rank
 
Normal rank

Latest revision as of 14:10, 1 July 2024

scientific article
Language Label Description Also known as
English
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
scientific article

    Statements

    A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier (English)
    0 references
    0 references
    12 May 2009
    0 references
    0 references
    domain extension
    0 references
    unpredictability
    0 references
    unforgeability
    0 references
    message authentication code
    0 references
    MAC
    0 references
    birthday bound
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references