Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
From MaRDI portal
Publication:4639496
DOI10.1007/978-3-662-52993-5_26zbMath1387.94105OpenAlexW2408271648MaRDI QIDQ4639496
Kaiyan Zheng, Yuling Li, Liting Zhang, Peng Wang
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_26
related-key attackmessage authentication codetweakable block cipheralmost universal hash functionrelated-key almost universal hash function
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Breaking and Repairing GCM Security Proofs
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Secure Message Authentication Against Related-Key Attack
- Pipelineable On-line Encryption
- Related-Key Forgeries for Prøst-OTR
- The Related-Key Security of Iterated Even–Mansour Ciphers
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
- A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
- Cryptography Secure against Related-Key Attacks and Tampering
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- Tweaking Even-Mansour Ciphers
- Badger – A Fast and Provably Secure MAC
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- MMH: Software message authentication in the Gbit/second rates
- Generic Related-Key Attacks for HMAC
- Power of a Public Random Permutation and Its Application to Authenticated Encryption
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology