A New Mode of Operation for Block Ciphers and Length-Preserving MACs
From MaRDI portal
Publication:5458593
DOI10.1007/978-3-540-78967-3_12zbMATH Open1149.94311OpenAlexW2120644709MaRDI QIDQ5458593FDOQ5458593
Prashant Puniya, Krzysztof Pietrzak, Yevgeniy Dodis
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_12
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Keying Hash Functions for Message Authentication
- One Way Hash Functions and DES
- Title not available (Why is that?)
- Title not available (Why is that?)
- CBC MAC for real-time data sources
- A Tight Bound for EMAC
- Improved Security Analyses for CBC MACs
- Automata, Languages and Programming
- Title not available (Why is that?)
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- New proofs for NMAC and HMAC: security without collision resistance
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- Feistel Networks Made Public, and Applications
Cited In (15)
- Message Authentication Codes from Unpredictable Block Ciphers
- Salvaging Merkle-Damgård for Practical Applications
- Selected Areas in Cryptography
- Title not available (Why is that?)
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- Secure Message Authentication Against Related-Key Attack
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- Cryptography and Coding
- Multi-property-preserving domain extension using polynomial-based modes of operation
- Open problems in hash function security
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- On the XOR of Multiple Random Permutations
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security
This page was built for publication: A New Mode of Operation for Block Ciphers and Length-Preserving MACs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458593)