On the security of iterated message authentication codes
From MaRDI portal
Publication:4701253
DOI10.1109/18.746787zbMATH Open0947.94016OpenAlexW2112006428MaRDI QIDQ4701253FDOQ4701253
Authors: Bart Preneel, P. C. Van Oorschot
Publication date: 21 November 1999
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/698855f55cbd645b46dd5b2f205bc08ac27ea49d
Recommendations
Cited In (33)
- Generic universal forgery attack on iterative hash-based MACs
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- Construct message authentication code with SHA and AEA
- New proofs for NMAC and HMAC: security without collision resistance
- Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs
- Impossible differential properties of reduced round Streebog
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier
- MAC Reforgeability
- Security of message authentication codes in the presence of key-dependent messages
- The power of primes: security of authentication based on a universal hash-function family
- Optimal forgeries against polynomial-based MACs and GCM
- Title not available (Why is that?)
- History-Free Aggregate Message Authentication Codes
- New attacks against standardized MACs.
- Keyed Streebog is a secure PRF and MAC
- On the security margin of MAC striping
- Title not available (Why is that?)
- Legal messages for some message authentication functions in block ciphers
- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- On the security of two MAC algorithms
- A general model for MAC generation using direct injection
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Title not available (Why is that?)
- Open problems in hash function security
- Boosting Merkle-Damgård Hashing for Message Authentication
- A tight bound for exhaustive key search attacks against message authentication codes
- Security of Truncated MACs
- Multilane HMAC— Security beyond the Birthday Limit
- Title not available (Why is that?)
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
- Second Preimages for Iterated Hash Functions and Their Implications on MACs
This page was built for publication: On the security of iterated message authentication codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4701253)