Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
From MaRDI portal
Publication:2129001
DOI10.1007/978-3-030-84252-9_11zbMath1487.94137OpenAlexW3118229390MaRDI QIDQ2129001
Jian Weng, Yaobin Shen, Lei Wang, Da-Wu Gu
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_11
Related Items (3)
Key-reduced variants of 3Kf9 with beyond-birthday-bound security ⋮ Improved multi-user security using the squared-ratio method ⋮ Multi-user BBB security of public permutations based MAC
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Revisiting structure graphs: applications to CBC-MAC and EMAC
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Generic attacks against beyond-birthday-bound MACs
- Blockcipher-based MACs: beyond the birthday bound without message length
- Analyzing multi-key security degradation
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Tight security bounds for double-block hash-then-sum MACs
- On the adaptive security of MACs and PRFs
- Optimally Secure Block Ciphers from Ideal Primitives
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
- Another Look at Tightness
- Keying Hash Functions for Message Authentication
- Multi-key Security: The Even-Mansour Construction Revisited
- PRESENT: An Ultra-Lightweight Block Cipher
- The “Coefficients H” Technique
- A MAC Mode for Lightweight Block Ciphers
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
- GIFT: A Small Present
- The Sum of CBC MACs Is a Secure PRF
- A New Variant of PMAC: Beyond the Birthday Bound
- Tight Security Bounds for Key-Alternating Ciphers
- Improved Security Analyses for CBC MACs
- The Multi-user Security of Double Encryption
- Fast Software Encryption
- The security of the cipher block chaining message authentication code
This page was built for publication: Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting