On the security of keyed hashing based on public permutations
From MaRDI portal
Publication:6186773
Recommendations
Cites work
- scientific article; zbMATH DE number 2086719 (Why is no real title available?)
- scientific article; zbMATH DE number 1406792 (Why is no real title available?)
- A MAC mode for lightweight block ciphers
- A construction of a cipher from a single pseudorandom permutation.
- Differential Propagation Analysis of Keccak
- Fast Software Encryption
- Fast Software Encryption
- Full-state keyed duplex with built-in multi-user support
- How to stretch random functions: The security of protected counter sums
- Keying hash functions for message authentication
- New hash functions and their use in authentication and set equality
- OMAC: one-key CBC MAC.
- On fast and provably secure message authentication based on universal hashing
- On the Indifferentiability of the Sponge Construction
- Thinking outside the superbox
Cited in
(3)
This page was built for publication: On the security of keyed hashing based on public permutations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186773)