Revisiting structure graphs: applications to CBC-MAC and EMAC
From MaRDI portal
Publication:350515
DOI10.1515/jmc-2016-0030zbMath1384.94073OpenAlexW2552526125WikidataQ56475235 ScholiaQ56475235MaRDI QIDQ350515
Publication date: 7 December 2016
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2016-0030
Combinatorics in computer science (68R05) Graph theory (including graph drawing) in computer science (68R10) Cryptography (94A60) Probability in computer science (algorithm analysis, random structures, phase transitions, etc.) (68Q87)
Related Items (6)
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ Key-reduced variants of 3Kf9 with beyond-birthday-bound security ⋮ Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} ⋮ Fine-tuning the ISO/IEC standard \textsf{LightMAC} ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ Tight security bounds for double-block hash-then-sum MACs
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- CBC MACs for arbitrary-length messages: The three-key constructions
- CBC MAC for real-time data sources
- Decorrelation: a theory for block cipher security
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound
- The Exact PRF-Security of NMAC and HMAC
- Improved security analysis for OMAC as a pseudorandom function
- Fast and Secure CBC-Type MAC Algorithms
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
- New Bounds for PMAC, TMAC, and XCBC
- Improved security analysis of PMAC
- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
- A Tight Bound for EMAC
- The “Coefficients H” Technique
- New directions in cryptography
- RIPEMD-160: A strengthened version of RIPEMD
- 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
- The Sum of CBC MACs Is a Secure PRF
- A New Variant of PMAC: Beyond the Birthday Bound
- Advances in Cryptology – CRYPTO 2004
- Progress in Cryptology - INDOCRYPT 2003
- Improved Security Analyses for CBC MACs
- Theory of Cryptography
- Fast Software Encryption
- The security of the cipher block chaining message authentication code
This page was built for publication: Revisiting structure graphs: applications to CBC-MAC and EMAC