A New Mode of Operation for Block Ciphers and Length-Preserving MACs
From MaRDI portal
Publication:5458593
Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 1303133 (Why is no real title available?)
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- scientific article; zbMATH DE number 1942429 (Why is no real title available?)
- scientific article; zbMATH DE number 2086702 (Why is no real title available?)
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- scientific article; zbMATH DE number 1418299 (Why is no real title available?)
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- A Tight Bound for EMAC
- Advances in Cryptology – CRYPTO 2004
- Automata, Languages and Programming
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- CBC MAC for real-time data sources
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Feistel Networks Made Public, and Applications
- Improved Security Analyses for CBC MACs
- Keying hash functions for message authentication
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- New proofs for NMAC and HMAC: security without collision resistance
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- One Way Hash Functions and DES
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
Cited in
(15)- scientific article; zbMATH DE number 1418256 (Why is no real title available?)
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Message Authentication Codes from Unpredictable Block Ciphers
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
- Selected Areas in Cryptography
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- On the XOR of multiple random permutations
- Secure message authentication against related-key attack
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- Cryptography and Coding
- Salvaging Merkle-Damgård for Practical Applications
- Open problems in hash function security
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security
- Multi-property-preserving domain extension using polynomial-based modes of operation
This page was built for publication: A New Mode of Operation for Block Ciphers and Length-Preserving MACs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458593)