Sciweavers

Share
6 search results - page 1 / 2
» Key-Recovery Attacks on Universal Hash Function Based MAC Al...
Sort
View
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
11 years 3 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
ISW
1997
Springer
11 years 5 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it deļ¬nes the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
11 years 5 months ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
11 years 7 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
CRYPTO
2006
Springer
129views Cryptology» more  CRYPTO 2006»
11 years 3 months ago
New Proofs for
HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent...
Mihir Bellare
books