Key-Recovery Attacks Against the MAC Algorithm Chaskey
From MaRDI portal
Publication:2807207
DOI10.1007/978-3-319-31301-6_12zbMATH Open1396.94091OpenAlexW2401637401MaRDI QIDQ2807207FDOQ2807207
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_12
Recommendations
- scientific article; zbMATH DE number 1759778
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- scientific article; zbMATH DE number 2043327
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- Rotational cryptanalysis on MAC algorithm chaskey
- Partial key recovery attack against RMAC
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Practical attack on NLM-MAC scheme
- Cryptography and Coding
Cites Work
- Adavanced slide attacks
- Title not available (Why is that?)
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- CBC MACs for arbitrary-length messages: The three-key constructions
- Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- SipHash: A Fast Short-Input PRF
- Another Look at Provable Security
Cited In (4)
Uses Software
This page was built for publication: Key-Recovery Attacks Against the MAC Algorithm Chaskey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807207)