A New Variant of PMAC: Beyond the Birthday Bound
From MaRDI portal
Publication:5199215
DOI10.1007/978-3-642-22792-9_34zbMath1290.94139OpenAlexW200355028MaRDI QIDQ5199215
Publication date: 12 August 2011
Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_34
Related Items (32)
PMAC with Parity: Minimizing the Query-Length Influence ⋮ Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Revisiting structure graphs: applications to CBC-MAC and EMAC ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Tweakable Blockciphers with Asymptotically Optimal Security ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Key-reduced variants of 3Kf9 with beyond-birthday-bound security ⋮ Quantum attacks against BBB secure PRFs or MACs built from public random permutations ⋮ Luby-Rackoff backwards with more users and more security ⋮ Fine-tuning the ISO/IEC standard \textsf{LightMAC} ⋮ On the Efficiency of ZMAC-Type Modes ⋮ Output masking of tweakable Even-Mansour can be eliminated for message authentication code ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ How to build optimally secure PRFs using block ciphers ⋮ Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data ⋮ Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption ⋮ Almost universal forgery attacks on AES-based MAC's ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication ⋮ Topology-hiding computation on all graphs ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 ⋮ Tight security bounds for double-block hash-then-sum MACs ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC ⋮ Attacks on beyond-birthday-bound MACs in the quantum setting ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
Uses Software
This page was built for publication: A New Variant of PMAC: Beyond the Birthday Bound