Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
From MaRDI portal
Publication:2129001
Recommendations
- scientific article; zbMATH DE number 2089141
- Beyond birthday bound secure MAC in faulty nonce model
- Generic attacks against beyond-birthday-bound MACs
- A Note on the Security Framework of Two-key DbHtS MACs
- Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- Tight security bounds for double-block hash-then-sum MACs
- Multi-user BBB security of public permutations based MAC
- Blockcipher-based MACs: beyond the birthday bound without message length
Cites work
- scientific article; zbMATH DE number 5009203 (Why is no real title available?)
- scientific article; zbMATH DE number 2086719 (Why is no real title available?)
- scientific article; zbMATH DE number 1418299 (Why is no real title available?)
- 3kf9: enhancing 3GPP-MAC beyond the birthday bound
- A MAC mode for lightweight block ciphers
- A new variant of PMAC: beyond the birthday bound
- Analyzing multi-key security degradation
- Another look at tightness
- Blockcipher-based MACs: beyond the birthday bound without message length
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Generic attacks against beyond-birthday-bound MACs
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Improved Security Analyses for CBC MACs
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- Keying hash functions for message authentication
- Multi-key security: the Even-Mansour construction revisited
- OMAC: one-key CBC MAC.
- On the adaptive security of MACs and PRFs
- Optimally secure block ciphers from ideal primitives
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Revisiting structure graphs: applications to CBC-MAC and EMAC
- The Multi-user Security of Double Encryption
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- The security of the cipher block chaining message authentication code
- The sum of CBC MACs is a secure PRF
- The “Coefficients H” Technique
- Tight security bounds for double-block hash-then-sum MACs
- Tight security bounds for key-alternating ciphers
Cited in
(10)- Key-reduced variants of 3Kf9 with beyond-birthday-bound security
- A Note on the Security Framework of Two-key DbHtS MACs
- Improved multi-user security using the squared-ratio method
- \textsf{LightMAC}: fork it and make it faster
- How to Thwart Birthday Attacks against MACs via Small Randomness
- A sponge-based PRF with good multi-user security
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Tight security bounds for double-block hash-then-sum MACs
- The multi-user security of MACs via universal hashing in the ideal cipher model
- Multi-user BBB security of public permutations based MAC
This page was built for publication: Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129001)