The security of the cipher block chaining message authentication code

From MaRDI portal
Publication:5929912

DOI10.1006/jcss.1999.1694zbMath0970.68054OpenAlexW2125591151WikidataQ115149541 ScholiaQ115149541MaRDI QIDQ5929912

Joe Kilian, Mihir Bellare, Phillip Rogaway

Publication date: 17 April 2001

Published in: Journal of Computer and System Sciences (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1006/jcss.1999.1694




Related Items

Strong Authenticity with Leakage Under Weak and Falsifiable Physical AssumptionsON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATIONMoSS: modular security specifications frameworkRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingAutomated proofs of block cipher modes of operationFUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATIONUsing the numerical solution for partial fractional differential equation by ADI numerical method to cryptography in Hill matrix systemIncremental cryptography revisited: PRFs, nonces and modular designRevisiting structure graphs: applications to CBC-MAC and EMACAn analysis of the blockcipher-based hash functions from PGVBeyond-birthday secure domain-preserving PRFs from a single permutationQCB is blindly unforgeableBlockcipher-based authenticated encryption: how small can we go?Integrity Analysis of Authenticated Encryption Based on Stream CiphersOn the Notions of PRP-RKA, KR and KR-RKA for Block CiphersKey-reduced variants of 3Kf9 with beyond-birthday-bound securityNew proofs for NMAC and HMAC: security without collision resistanceEfficient One-Round Key Exchange in the Standard ModelQuantum attacks on beyond-birthday-bound MACsImproved security analysis for nonce-based enhanced hash-then-mask MACsThe State of the Authenticated EncryptionTweakable block ciphersConcealment and Its Applications to Authenticated EncryptionOn the Security of the Winternitz One-Time Signature SchemeOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersNotions and relations for RKA-secure permutation and function familiesSimple password-based three-party authenticated key exchange without server public keysA Provable-Security Treatment of the Key-Wrap ProblemNIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and AuthenticationBasing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric CryptographyThe power of primes: security of authentication based on a universal hash-function familyReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityContributory Password-Authenticated Group Key Exchange with Join CapabilityStronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsOn cryptographic properties of the $CVV$ and $PVV$ parameters generation procedures in payment systemsBernoulli numbers and the probability of a birthday surpriseTight security bounds for double-block hash-then-sum MACsEncryption modes with almost free message integrityAuthenticated encryption: relations among notions and analysis of the generic composition paradigmBuilding Secure Block Ciphers on Generic Attacks AssumptionsBreaking Symmetric Cryptosystems Using Quantum Period FindingSecurity of Hash-then-CBC Key Wrapping RevisitedCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACEconomically Optimal Variable Tag Length Message AuthenticationOn the security of \textsf{TrCBC}Private set intersection in the internet setting from lightweight oblivious PRF



Cites Work