New Proofs for NMAC and HMAC: Security Without Collision-Resistance
From MaRDI portal
Publication:5756643
DOI10.1007/11818175_36zbMath1161.68437OpenAlexW2134615993WikidataQ56675195 ScholiaQ56675195MaRDI QIDQ5756643
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_36
Related Items
Provable security analysis of FIDO2 ⋮ Streebog compression function as PRF in secret-key settings ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Quantum algorithms for the \(k\)-XOR problem ⋮ The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC ⋮ Incremental cryptography revisited: PRFs, nonces and modular design ⋮ Generalizing PMAC Under Weaker Assumptions ⋮ Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks ⋮ Hardware security without secure hardware: how to decrypt with a password and a server ⋮ Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Related-key attacks on the compression function of Streebog ⋮ Keyed Streebog is a secure PRF and MAC ⋮ Improved generic attacks against hash-based MACs and HAIFA ⋮ Let attackers program ideal models: modularity and composability for adaptive compromise ⋮ Block-cipher-based tree hashing ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Introducing the counter mode of operation to compressed sensing based encryption ⋮ A simple variant of the Merkle-Damgård scheme with a permutation ⋮ Simple and more efficient PRFs with tight security from LWE and matrix-DDH ⋮ Analysis of Multivariate Hash Functions ⋮ On the security of the WOTS-PRF signature scheme ⋮ Boosting Merkle-Damgård Hashing for Message Authentication ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ On the Security of the Winternitz One-Time Signature Scheme ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography ⋮ Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 ⋮ Multilane HMAC— Security beyond the Birthday Limit ⋮ Extended Multi-Property-Preserving and ECM-Construction ⋮ New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 ⋮ Security of NMAC and HMAC Based on Non-malleability ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Order-Preserving Symmetric Encryption ⋮ Key distribution. Episode 1: Quantum menace ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ Updatable signatures and message authentication codes ⋮ A Scheme to Base a Hash Function on a Block Cipher ⋮ Delayed-Key Message Authentication for Streams ⋮ Group Key Management: From a Non-hierarchical to a Hierarchical Structure ⋮ Collision-resistant and pseudorandom function based on Merkle-Damgård hash function ⋮ Pseudorandom Functions: Three Decades Later ⋮ Key-homomorphic pseudorandom functions from LWE with small modulus
This page was built for publication: New Proofs for NMAC and HMAC: Security Without Collision-Resistance