On the security of iterated message authentication codes
From MaRDI portal
Publication:4701253
Recommendations
Cited in
(33)- Second Preimages for Iterated Hash Functions and Their Implications on MACs
- Generic universal forgery attack on iterative hash-based MACs
- New proofs for NMAC and HMAC: security without collision resistance
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- Construct message authentication code with SHA and AEA
- Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs
- Impossible differential properties of reduced round Streebog
- Security of message authentication codes in the presence of key-dependent messages
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier
- MAC Reforgeability
- The power of primes: security of authentication based on a universal hash-function family
- Optimal forgeries against polynomial-based MACs and GCM
- scientific article; zbMATH DE number 1418299 (Why is no real title available?)
- History-Free Aggregate Message Authentication Codes
- New attacks against standardized MACs.
- On the security margin of MAC striping
- Keyed Streebog is a secure PRF and MAC
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- Legal messages for some message authentication functions in block ciphers
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments
- On the security of two MAC algorithms
- A general model for MAC generation using direct injection
- scientific article; zbMATH DE number 1759778 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Open problems in hash function security
- scientific article; zbMATH DE number 1759780 (Why is no real title available?)
- Boosting Merkle-Damgård Hashing for Message Authentication
- A tight bound for exhaustive key search attacks against message authentication codes
- Security of Truncated MACs
- Multilane HMAC— Security beyond the Birthday Limit
- scientific article; zbMATH DE number 5525643 (Why is no real title available?)
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
This page was built for publication: On the security of iterated message authentication codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4701253)