Key-Recovery Attacks Against the MAC Algorithm Chaskey
From MaRDI portal
Publication:2807207
DOI10.1007/978-3-319-31301-6_12zbMATH Open1396.94091OpenAlexW2401637401MaRDI QIDQ2807207FDOQ2807207
Authors: Chrysanthi Mavromati
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_12
Recommendations
- scientific article; zbMATH DE number 1759778
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- scientific article; zbMATH DE number 2043327
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- Rotational cryptanalysis on MAC algorithm chaskey
- Partial key recovery attack against RMAC
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Practical attack on NLM-MAC scheme
- Cryptography and Coding
Cites Work
- Adavanced slide attacks
- Title not available (Why is that?)
- Minimalism in cryptography: the Even-Mansour scheme revisited
- CBC MACs for arbitrary-length messages: The three-key constructions
- Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- SipHash: a fast short-input PRF
- Another look at provable security. (Abstract)
Cited In (6)
- Practical attack on NLM-MAC scheme
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning
- Rotational cryptanalysis on MAC algorithm chaskey
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
Uses Software
This page was built for publication: Key-Recovery Attacks Against the MAC Algorithm Chaskey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807207)