scientific article; zbMATH DE number 2086719

From MaRDI portal
Publication:4737258

zbMath1056.94520MaRDI QIDQ4737258

Phillip Rogaway, John Black

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320384.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (43)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelPMAC with Parity: Minimizing the Query-Length InfluenceRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingOn modes of operations of a block cipher for authentication and authenticated encryptionIncremental cryptography revisited: PRFs, nonces and modular design\textsf{Light-OCB}: parallel lightweight authenticated cipher with full securityGeneralizing PMAC Under Weaker AssumptionsRevisiting structure graphs: applications to CBC-MAC and EMACNon-adaptive Group-Testing Aggregate MAC SchemeAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityKey-reduced variants of 3Kf9 with beyond-birthday-bound securityTowards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}Quantum attacks against BBB secure PRFs or MACs built from public random permutationsQuantum linearization attacksFine-tuning the ISO/IEC standard \textsf{LightMAC}\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherOn the Efficiency of ZMAC-Type ModesQuantum attacks on beyond-birthday-bound MACsOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeUniversal hashing based on field multiplication and (near-)MDS matricesOn the security of keyed hashing based on public permutationsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityImproved security analysis for nonce-based enhanced hash-then-mask MACsJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherA One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday BarrierRevisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated EncryptionOn Efficient Message Authentication Via Block Cipher Design TechniquesA MAC Mode for Lightweight Block CiphersA note on the chi-square method: a tool for proving cryptographic securityOn the optimality of non-linear computations for symmetric key primitivesA Provable-Security Treatment of the Key-Wrap ProblemThe Oribatida v1.3 family of lightweight authenticated encryption schemesA New Mode of Operation for Incremental Authenticated Encryption with Associated DataCryptanalysis of OCB2: attacks on authenticity and confidentialityOne-Key Compression Function Based MAC with Security Beyond Birthday BoundTight security bounds for double-block hash-then-sum MACsAuthenticated encryption: relations among notions and analysis of the generic composition paradigmPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersBreaking Symmetric Cryptosystems Using Quantum Period FindingLinicrypt: A Model for Practical CryptographyCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersMulti-user BBB security of public permutations based MACIQRA: Incremental Quadratic Re-keying friendly Authentication scheme




This page was built for publication: