Blockcipher-based MACs: beyond the birthday bound without message length
From MaRDI portal
Recommendations
Cited in
(36)- A new variant of PMAC: beyond the birthday bound
- A MAC mode for lightweight block ciphers
- Tight security bound of \textsf{2k-LightMAC\_Plus}
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- Extending AES improvements: a proposal for alpha-MAC in view of collision resistance
- Full PRF-secure message authentication code based on tweakable block cipher
- Quantum linearization attacks
- On the Security of Blockwise Secure Modes of Operation Beyond the Birthday Bound
- 3kf9: enhancing 3GPP-MAC beyond the birthday bound
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Tight security bounds for double-block hash-then-sum MACs
- \textsf{LightMAC}: fork it and make it faster
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- A Note on the Security Framework of Two-key DbHtS MACs
- One-key compression function based MAC with security beyond birthday bound
- Proof of mirror theory for a wide range of \(\xi_{\max }\)
- Domain extension for MACs beyond the birthday barrier
- scientific article; zbMATH DE number 2089141 (Why is no real title available?)
- Quantum attacks on beyond-birthday-bound MACs
- Generic attacks against beyond-birthday-bound MACs
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
- The multi-user security of MACs via universal hashing in the ideal cipher model
- How to build optimally secure PRFs using block ciphers
- Categorization of faulty nonce misuse resistant message authentication
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- A unified method for improving PRF bounds for a class of blockcipher based MACs
- On the Efficiency of ZMAC-Type Modes
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security
- Tight security of cascaded LRW2
- How to Thwart Birthday Attacks against MACs via Small Randomness
- Fine-tuning the ISO/IEC standard \textsf{LightMAC}
- Improved security bound of LightMAC\_Plus and its single-key variant
- A highly secure MAC from tweakable blockciphers with support for short tweaks
This page was built for publication: Blockcipher-based MACs: beyond the birthday bound without message length
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1701456)