On Fast and Provably Secure Message Authentication Based on Universal Hashing

From MaRDI portal
Revision as of 20:12, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3452360

DOI10.1007/3-540-68697-5_24zbMath1329.94087OpenAlexW1535554763MaRDI QIDQ3452360

Victor Shoup

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_24




Related Items (37)

Attacks on quantum key distribution protocols that employ non-ITS authenticationAnalysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3Variants of Wegman-Carter message authentication code supporting variable tag lengthsOn modes of operations of a block cipher for authentication and authenticated encryptionVariationally universal hashingIncremental cryptography revisited: PRFs, nonces and modular designOptimal forgeries against polynomial-based MACs and GCMGeneralizing PMAC Under Weaker AssumptionsA new multi-linear universal hash familyOn-line ciphers and the Hash-CBC constructionsTweakable Blockciphers with Asymptotically Optimal SecurityOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesImproving classical authentication over a quantum channelThe universality of iterated hashing over variable-length stringsCategorization of faulty nonce misuse resistant message authenticationOn weak keys and forgery attacks against polynomial-based MAC schemesQuantum attacks on PRFs based on public random permutationsBeyond Uber: instantiating generic groups via PGGsOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeUniversal hashing based on field multiplication and (near-)MDS matricesOn the security of keyed hashing based on public permutationsA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityImproved security analysis for nonce-based enhanced hash-then-mask MACsTweakable block ciphersMMH: Software message authentication in the Gbit/second ratesMRD HashingRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsEHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATIONModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorThe circulant hash revisitedBreaking LWC candidates: sESTATE and Elephant in quantum settingAnalysis of the single-permutation encrypted Davies-Meyer constructionCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACMRD hashing.The summation-truncation hybrid: reusing discarded bits for free



Cites Work




This page was built for publication: On Fast and Provably Secure Message Authentication Based on Universal Hashing