scientific article; zbMATH DE number 1418297
From MaRDI portal
Publication:4941857
zbMath0940.94020MaRDI QIDQ4941857
Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway, John Black
Publication date: 26 July 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (40)
Variants of Wegman-Carter message authentication code supporting variable tag lengths ⋮ HalftimeHash: modern hashing without 64-bit multipliers or finite fields ⋮ Variationally universal hashing ⋮ Bug attacks ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ CBCR: CBC MAC with rotating transformations ⋮ A new multi-linear universal hash family ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers ⋮ Message authentication based on cryptographically secure CRC without polynomial irreducibility test ⋮ On weak keys and forgery attacks against polynomial-based MAC schemes ⋮ New proofs for NMAC and HMAC: security without collision resistance ⋮ Tweakable enciphering schemes using only the encryption function of a block cipher ⋮ A trade-off between collision probability and key size in universal hashing using polynomials ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier ⋮ Tweakable block ciphers ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Rotational cryptanalysis on MAC algorithm chaskey ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ RIV for Robust Authenticated Encryption ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes ⋮ Об одном семействе универсальных функций хеширования ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers ⋮ The security of the cipher block chaining message authentication code ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ Bug Attacks ⋮ Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography ⋮ Good Variants of HB + Are Hard to Find ⋮ Refined quorum systems ⋮ Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Revisiting construction of online cipher in hash-ECB-hash structure ⋮ Encryption modes with almost free message integrity ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
This page was built for publication: