swMATH26748MaRDI QIDQ38477FDOQ38477
Author name not available (Why is that?)
Official website: https://cr.yp.to/mac.html
Cited In (41)
- The circulant hash revisited
- CryptDances
- MessagePack
- Evaluating Bernstein-Rabin-Winograd polynomials
- A quantum hash function with grouped coarse-grained boson sampling
- Quantum key distribution using universal hash functions over finite fields
- Remus
- Variants of Wegman-Carter message authentication code supporting variable tag lengths
- HalftimeHash: modern hashing without 64-bit multipliers or finite fields
- Romulus
- XooTools
- Variationally universal hashing
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- On modes of operations of a block cipher for authentication and authenticated encryption
- libsodium
- The design and evolution of OCB
- Connecting tweakable and multi-key blockcipher security
- Partition oracles from weak key forgeries
- Salsa20
- ChaCha
- Rumba20
- SipHash
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- A trade-off between collision probability and key size in universal hashing using polynomials
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- COBRA
- SNOW
- McOE
- ELmE
- MMH
- Minalpher
- The software performance of authenticated-encryption modes
- Another look at tightness
- CBCR: CBC MAC with rotating transformations
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- A new multi-linear universal hash family
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
- Single-trace side-channel analysis on polynomial-based MAC schemes
- Polye+CTR: a swiss-army-knife mode for block ciphers
- Efficient schemes for committing authenticated encryption
This page was built for software: Poly1305-AES