A New Variant of PMAC: Beyond the Birthday Bound

From MaRDI portal
Publication:5199215

DOI10.1007/978-3-642-22792-9_34zbMath1290.94139OpenAlexW200355028MaRDI QIDQ5199215

Kan Yasuda

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_34




Related Items (32)

PMAC with Parity: Minimizing the Query-Length InfluenceRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingIncremental cryptography revisited: PRFs, nonces and modular designFull indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodRevisiting structure graphs: applications to CBC-MAC and EMACStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionTweakable Blockciphers with Asymptotically Optimal Security\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsTight security of cascaded LRW2Proof of mirror theory for a wide range of \(\xi_{\max }\)Key-reduced variants of 3Kf9 with beyond-birthday-bound securityQuantum attacks against BBB secure PRFs or MACs built from public random permutationsLuby-Rackoff backwards with more users and more securityFine-tuning the ISO/IEC standard \textsf{LightMAC}On the Efficiency of ZMAC-Type ModesOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeImproved security analysis for nonce-based enhanced hash-then-mask MACsHow to build optimally secure PRFs using block ciphersProbably Secure Keyed-Function Based Authenticated Encryption Schemes for Big DataRevisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated EncryptionAlmost universal forgery attacks on AES-based MAC'sA MAC Mode for Lightweight Block CiphersStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionUsing an Error-Correction Code for Fast, Beyond-Birthday-Bound AuthenticationTopology-hiding computation on all graphsOne-Key Compression Function Based MAC with Security Beyond Birthday BoundMind the composition: birthday bound attacks on EWCDMD and SoKAC21Tight security bounds for double-block hash-then-sum MACsCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACAttacks on beyond-birthday-bound MACs in the quantum settingLightweight authenticated encryption mode suitable for threshold implementation


Uses Software



This page was built for publication: A New Variant of PMAC: Beyond the Birthday Bound