scientific article; zbMATH DE number 2086719
From MaRDI portal
Publication:4737258
zbMATH Open1056.94520MaRDI QIDQ4737258FDOQ4737258
Authors: John Black, Phillip Rogaway
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320384.htm
Title of this publication is not available (Why is that?)
Recommendations
- scientific article; zbMATH DE number 5525643
- Topics in Cryptology – CT-RSA 2004
- On modes of operations of a block cipher for authentication and authenticated encryption
- On Efficient Message Authentication Via Block Cipher Design Techniques
- scientific article; zbMATH DE number 2043337
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- scientific article; zbMATH DE number 2043348
- Parallelizing the Camellia and SMS4 block ciphers
- The security of the cipher block chaining message authentication code
- Parallelizable and authenticated online ciphers
Data encryption (aspects in computer science) (68P25) Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Parallel algorithms in computer science (68W10) Authentication, digital signatures and secret sharing (94A62)
Cited In (76)
- Fine-tuning the ISO/IEC standard \textsf{LightMAC}
- \textsf{LightMAC}: fork it and make it faster
- Quantum linearization attacks
- Криптосистема блочного гаммирования с аутентификацией
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \)
- On the security of keyed hashing based on public permutations
- Universal hashing based on field multiplication and (near-)MDS matrices
- Parallel verification of serial MAC and AE modes
- Farasha: a provable permutation-based parallelizable PRF
- Multimixer-156: universal keyed hashing based on integer multiplication and cyclic shift
- Tight security bound of \textsf{2k-LightMAC\_Plus}
- The security of ``one-block-to-many modes of operation.
- A quantum-secure partial parallel MAC QPCBC
- Non-adaptive Group-Testing Aggregate MAC Scheme
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security
- Message Authentication Codes from Unpredictable Block Ciphers
- One-key compression function based MAC with security beyond birthday bound
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
- Fast message authentication using efficient polynomial evaluation
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- A Note on the Security Framework of Two-key DbHtS MACs
- NIST block cipher modes of operation for authentication and combined confidentiality and authentication
- A Provable-Security Treatment of the Key-Wrap Problem
- Fast Software Encryption
- PMAC with parity: minimizing the query-length influence
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Fast Software Encryption
- Breaking symmetric cryptosystems using quantum period finding
- Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
- Title not available (Why is that?)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- On modes of operations of a block cipher for authentication and authenticated encryption
- Parallelizable Authentication Trees
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- A note on the chi-square method: a tool for proving cryptographic security
- Linicrypt: a model for practical cryptography
- On the optimality of non-linear computations for symmetric key primitives
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
- Topics in Cryptology – CT-RSA 2004
- Improved security analysis of PMAC
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- A new authenticated encryption mode for arbitrary block cipher based on universal hash function
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- BCBC: a more efficient MAC algorithm
- On the Efficiency of ZMAC-Type Modes
- Title not available (Why is that?)
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- On Efficient Message Authentication Via Block Cipher Design Techniques
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Generalizing PMAC under weaker assumptions
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Encryption modes with almost free message integrity
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- On tight quantum security of HMAC and NMAC in the quantum random oracle model
- A MAC mode for lightweight block ciphers
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
- Tight security bounds for double-block hash-then-sum MACs
- A lightweight alternative to PMAC
- Revisiting structure graphs: applications to CBC-MAC and EMAC
- Incremental cryptography revisited: PRFs, nonces and modular design
- Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}
- Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Research on fast authentication modes of block cipher algorithm and their designs
- Fast Software Encryption
- Multi-user BBB security of public permutations based MAC
- Polye+CTR: a swiss-army-knife mode for block ciphers
- Quantum attacks on beyond-birthday-bound MACs
- Title not available (Why is that?)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
- A new variant of PMAC: beyond the birthday bound
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737258)