Keying Hash Functions for Message Authentication

From MaRDI portal
Publication:3452335

DOI10.1007/3-540-68697-5_1zbMath1329.94051OpenAlexW2131300413WikidataQ56675194 ScholiaQ56675194MaRDI QIDQ3452335

Hugo Krawczyk, Ran Canetti, Mihir Bellare

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_1




Related Items

Related-key attacks on the compression function of StreebogKeyed Streebog is a secure PRF and MACHardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSALet attackers program ideal models: modularity and composability for adaptive compromiseNon-adaptive Group-Testing Aggregate MAC SchemeKey-reduced variants of 3Kf9 with beyond-birthday-bound securityWhen messages are keys: is HMAC a dual-PRF?Universal hashing based on field multiplication and (near-)MDS matricesOn the security of keyed hashing based on public permutationsOn tight quantum security of HMAC and NMAC in the quantum random oracle modelAnother Look at TightnessStrong Authenticity with Leakage Under Weak and Falsifiable Physical AssumptionsMany a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key ExchangeProvable security analysis of FIDO2Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingUnintended features of APIs: cryptanalysis of incremental HMACArbitrated unconditionally secure authentication scheme with multi-sendersClairvoyant state machine replicationLESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communicationOn Fast and Provably Secure Message Authentication Based on Universal HashingPartition oracles from weak key forgeriesIncremental cryptography revisited: PRFs, nonces and modular designCCA secure \textit{a posteriori} openable encryption in the standard modelA Public Key Cryptosystem Using Hiil's CipherGeneralizing PMAC Under Weaker AssumptionsAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsCBCR: CBC MAC with rotating transformationsEfficient arbitrated quantum signature and its proof of securityEfficient schemes for committing authenticated encryptionHardware security without secure hardware: how to decrypt with a password and a serverOn optimal cryptographic key derivationSecurity analysis of randomize-hash-then-sign digital signaturesImpossible Differential Properties of Reduced Round StreebogImproved generic attacks against hash-based MACs and HAIFAFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsMessage authentication based on cryptographically secure CRC without polynomial irreducibility testNew proofs for NMAC and HMAC: security without collision resistanceQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityPublic-key generation with verifiable randomnessImproved security analysis for nonce-based enhanced hash-then-mask MACsA simple variant of the Merkle-Damgård scheme with a permutationProvably-secure time-bound hierarchical key assignment schemesA One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday BarrierAnalysis of Multivariate Hash FunctionsOn Efficient Message Authentication Via Block Cipher Design TechniquesCryptography and cryptographic protocolsSequential aggregate signatures with lazy verification from trapdoor permutationsConcealment and Its Applications to Authenticated EncryptionMMH: Software message authentication in the Gbit/second ratesReinventing the travois: Encryption/MAC in 30 ROM bytesNew Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message LengthModeling Random Oracles Under Unpredictable QueriesA cryptographic analysis of the TLS 1.3 handshake protocolCollisions of MMO-MD5 and Their Impact on Original MD5The NIST SHA-3 Competition: A Perspective on the Final YearRobust encryptionThe security of the cipher block chaining message authentication codeEfficient dissection of bicomposite problems with cryptanalytic applicationsKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsSlide Attacks on a Class of Hash FunctionsBasing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric CryptographyHow to Incorporate Associated Data in Sponge-Based Authenticated EncryptionMulti-property Preserving Combiners for Hash FunctionsBroadcast authentication for group communicationMultilane HMAC— Security beyond the Birthday LimitExtended Multi-Property-Preserving and ECM-ConstructionAn Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash FunctionsA New Mode of Operation for Block Ciphers and Length-Preserving MACsNew Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5Session resumption protocols and efficient forward security for TLS 1.3 0-RTTSecurity of NMAC and HMAC Based on Non-malleabilitySecure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUICOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsRobust multi-property combiners for hash functionsAn Integrated ECC-MAC Based on RS CodeOn Randomizing Hash Functions to Strengthen the Security of Digital SignaturesCryptanalysis on HMAC/NMAC-MD5 and MD5-MACOne-Key Compression Function Based MAC with Security Beyond Birthday BoundTight security bounds for double-block hash-then-sum MACsDistinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256Analysing the HPKE standardAuthenticated encryption: relations among notions and analysis of the generic composition paradigmSecond Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVALCryptanalysis of VortexCryptographic Verification by Typing for a Sample Protocol ImplementationUniversally Composable Private Proximity TestingGroup signatures with user-controlled and sequential linkabilityAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsA Scheme to Base a Hash Function on a Block CipherXMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security AssumptionsEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACNew records of pre-image search of reduced SHA-1 using SAT solversA symmetric cryptographic scheme for data integrity verification in cloud databasesUniversally Composable Security Analysis of TLSEconomically Optimal Variable Tag Length Message AuthenticationHandling adaptive compromise for practical encryption schemesKEMTLS with delayed forward identity protection in (almost) a single round tripA Public-Key Encryption Scheme with Pseudo-random CiphertextsKey Derivation Algorithms for Monotone Access Structures in Cryptographic File SystemsSecurity Notions for Disk EncryptionRevocable hierarchical identity-based authenticated key exchangeCollision-resistant and pseudorandom function based on Merkle-Damgård hash functionComputational Soundness of Symbolic Analysis for Protocols Using Hash FunctionsPseudorandom Functions: Three Decades LaterIQRA: Incremental Quadratic Re-keying friendly Authentication schemeSymmetric Authentication within a Simulatable Cryptographic LibraryKey-homomorphic pseudorandom functions from LWE with small modulus