scientific article; zbMATH DE number 1418297

From MaRDI portal
Publication:4941857

zbMath0940.94020MaRDI QIDQ4941857

Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway, John Black

Publication date: 26 July 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (40)

Variants of Wegman-Carter message authentication code supporting variable tag lengthsHalftimeHash: modern hashing without 64-bit multipliers or finite fieldsVariationally universal hashingBug attacksIncremental cryptography revisited: PRFs, nonces and modular designOptimal forgeries against polynomial-based MACs and GCMCBCR: CBC MAC with rotating transformationsA new multi-linear universal hash familyOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesIntegrity Analysis of Authenticated Encryption Based on Stream CiphersMessage authentication based on cryptographically secure CRC without polynomial irreducibility testOn weak keys and forgery attacks against polynomial-based MAC schemesNew proofs for NMAC and HMAC: security without collision resistanceTweakable enciphering schemes using only the encryption function of a block cipherA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityA One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday BarrierTweakable block ciphersOn Efficient Message Authentication Via Block Cipher Design TechniquesRotational cryptanalysis on MAC algorithm chaskeyConcealment and Its Applications to Authenticated EncryptionRIV for Robust Authenticated EncryptionRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesОб одном семействе универсальных функций хешированияThe Software Performance of Authenticated-Encryption ModesOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersThe security of the cipher block chaining message authentication codeModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsBug AttacksBasing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric CryptographyGood Variants of HB +  Are Hard to FindRefined quorum systemsНовый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэшированияOne-Key Compression Function Based MAC with Security Beyond Birthday BoundRevisiting construction of online cipher in hash-ECB-hash structureEncryption modes with almost free message integrityAuthenticated encryption: relations among notions and analysis of the generic composition paradigmEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC




This page was built for publication: