Almost universal forgery attacks on AES-based MAC's
From MaRDI portal
Publication:494579
DOI10.1007/S10623-014-9969-XzbMATH Open1359.94589OpenAlexW2017270479MaRDI QIDQ494579FDOQ494579
Authors: Orr Dunkelman, Nathan Keller, Adi Shamir
Publication date: 1 September 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-9969-x
Recommendations
- scientific article; zbMATH DE number 1759778
- Generic universal forgery attack on iterative hash-based MACs
- Fast Software Encryption
- On weak keys and forgery attacks against polynomial-based MAC schemes
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
- Cryptanalyses on a Merkle-Damgård based MAC -- almost universal forgery and distinguishing-\(H\) attacks
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Cites Work
- Title not available (Why is that?)
- A construction of a cipher from a single pseudorandom permutation.
- Title not available (Why is that?)
- Limitations of the Even-Mansour construction
- 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
- A new variant of PMAC: beyond the birthday bound
- New Birthday Attacks on Some MACs Based on Block Ciphers
- Cryptanalyses on a Merkle-Damgård based MAC -- almost universal forgery and distinguishing-\(H\) attacks
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- ALE: AES-Based Lightweight Authenticated Encryption
- Domain extension for MACs beyond the birthday barrier
- Improved impossible differential cryptanalysis of 7-round AES-128
- Another look at complementation properties
- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
- Practical collisions for SHAMATA-256
- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
- Title not available (Why is that?)
- Generic Related-Key Attacks for HMAC
- Automatic search of attacks on round-reduced AES and applications
- Advanced Encryption Standard – AES
- Fast Software Encryption
- New Impossible Differential Attacks on AES
Cited In (9)
- On the resilience of Even-Mansour to invariant permutations
- MAC Reforgeability
- New Birthday Attacks on Some MACs Based on Block Ciphers
- Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
- Analysis of indirect message injection for MAC generation using stream ciphers
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Title not available (Why is that?)
This page was built for publication: Almost universal forgery attacks on AES-based MAC's
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q494579)