Key-Recovery Attacks Against the MAC Algorithm Chaskey
From MaRDI portal
Publication:2807207
Recommendations
- scientific article; zbMATH DE number 1759778
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- scientific article; zbMATH DE number 2043327
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- Rotational cryptanalysis on MAC algorithm chaskey
- Partial key recovery attack against RMAC
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Practical attack on NLM-MAC scheme
- Cryptography and Coding
Cites work
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- Adavanced slide attacks
- Another look at provable security. (Abstract)
- CBC MACs for arbitrary-length messages: The three-key constructions
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Minimalism in cryptography: the Even-Mansour scheme revisited
- Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE
- SipHash: a fast short-input PRF
Cited in
(6)- Practical attack on NLM-MAC scheme
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning
- Rotational cryptanalysis on MAC algorithm chaskey
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
This page was built for publication: Key-Recovery Attacks Against the MAC Algorithm Chaskey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807207)