Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
From MaRDI portal
Publication:3618656
DOI10.1007/11799313_15zbMATH Open1234.94058OpenAlexW2143910645MaRDI QIDQ3618656FDOQ3618656
Yukiyasu Tsunoo, Kazuhiko Minematsu
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_15
Recommendations
- On the security of two MAC algorithms
- On the adaptive security of MACs and PRFs
- \(\mathcal{E}\)-MACs: towards more secure and more efficient constructions of secure channels
- E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels
- Differential power analysis of MAC-Keccak at any key-length
- Improved algebraic MACs and practical keyed-verification anonymous credentials
- Tight security bounds for double-block hash-then-sum MACs
- Improving the Security of MACs Via Randomized Message Preprocessing
- Almost universal forgery attacks on AES-based MAC's
Cited In (15)
- ASC-1: An Authenticated Encryption Stream Cipher
- E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- ALE: AES-Based Lightweight Authenticated Encryption
- Title not available (Why is that?)
- Another Look at Security Theorems for 1-Key Nested MACs
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- On Efficient Message Authentication Via Block Cipher Design Techniques
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- Badger – A Fast and Provably Secure MAC
- \(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC
- Almost universal forgery attacks on AES-based MAC's
- Generalizing PMAC Under Weaker Assumptions
- Multi-user BBB security of public permutations based MAC
This page was built for publication: Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3618656)