New Proofs for NMAC and HMAC: Security without Collision Resistance
暂无分享,去创建一个
[1] Mihir Bellare,et al. Improved Security Analyses for CBC MACs , 2005, CRYPTO.
[2] Chanathip Namprempre,et al. Authenticated encryption in SSH: provably fixing the SSH binary packet protocol , 2002, CCS '02.
[3] Chanathip Namprempre,et al. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm , 2004, TSEC.
[4] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[5] Bruce Schneier. One-way hash functions , 1991 .
[6] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[7] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[8] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[9] Hugo Krawczyk,et al. Pseudorandom functions revisited: the cascade construction and its concrete security , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[10] Hugo Krawczyk,et al. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.
[11] John Black,et al. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions , 2000, CRYPTO.
[12] Shoichi Hirose,et al. A Note on the Strength of Weak Collision Resistance , 2004 .
[13] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[14] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[15] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[16] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.
[17] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[18] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[19] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[20] T. Dierks,et al. The TLS protocol , 1999 .
[21] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[22] Antoon Bosselaers,et al. Collisions for the Compressin Function of MD5 , 1994, EUROCRYPT.
[23] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[24] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[25] Mihir Bellare,et al. The Power of Verification Queries in Message Authentication and Authenticated Encryption , 2004, IACR Cryptol. ePrint Arch..
[26] Mihir Bellare,et al. Code-Based Game-Playing Proofs and the Security of Triple Encryption , 2004, IACR Cryptol. ePrint Arch..
[27] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[28] David M'Raïhi,et al. HOTP: An HMAC-Based One-Time Password Algorithm , 2005, RFC.
[29] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[30] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[31] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[32] Bart Preneel,et al. On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.
[33] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.