On the Security of Two MAC Algorithms
暂无分享,去创建一个
[1] Donald W. Davies,et al. Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.) , 1989, Wiley series in communication and distributed systems.
[2] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] Donald W. Davies,et al. A Message Authenticator Algorithm Suitable for A Mainframe Computer , 1985, CRYPTO.
[5] Gene Tsudik. Message authentication with one-way hash functions , 1992, CCRV.
[6] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[7] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[8] Perry Metzger,et al. IP Authentication using Keyed MD5 , 1995, RFC.
[9] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[10] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[11] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.