Generic attacks against beyond-birthday-bound MACs
From MaRDI portal
Publication:1673397
DOI10.1007/978-3-319-96884-1_11zbMATH Open1444.94084OpenAlexW2806564472MaRDI QIDQ1673397FDOQ1673397
Authors: Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
Publication date: 12 September 2018
Full work available at URL: https://hal.inria.fr/hal-01944318/file/2018-541.pdf
Recommendations
- Tight security bounds for double-block hash-then-sum MACs
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Blockcipher-based MACs: beyond the birthday bound without message length
- New generic attacks against hash-based MACs
- Improved security bound of LightMAC\_Plus and its single-key variant
Cited In (27)
- 3kf9: enhancing 3GPP-MAC beyond the birthday bound
- One-key compression function based MAC with security beyond birthday bound
- Domain extension for MACs beyond the birthday barrier
- Extending AES improvements: a proposal for alpha-MAC in view of collision resistance
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- A Note on the Security Framework of Two-key DbHtS MACs
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Tight security of cascaded LRW2
- New Birthday Attacks on Some MACs Based on Block Ciphers
- How to Thwart Birthday Attacks against MACs via Small Randomness
- Practical attack on NLM-MAC scheme
- Forgery attacks on several beyond-birthday-bound secure MACs
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \)
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- Tight security bound of \textsf{2k-LightMAC\_Plus}
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
- Tight security bounds for double-block hash-then-sum MACs
- Improved security bound of LightMAC\_Plus and its single-key variant
- Universal forgery and multiple forgeries of MergeMAC and generalized constructions
- Indirect message injection for MAC generation
- Blockcipher-based MACs: beyond the birthday bound without message length
- Quantum attacks on beyond-birthday-bound MACs
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
- FSBday
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security
This page was built for publication: Generic attacks against beyond-birthday-bound MACs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673397)