Sciweavers

Share
4 search results - page 1 / 1
» XOR MACs: New Methods for Message Authentication Using Finit...
Sort
View
CRYPTO
1995
Springer
93views Cryptology» more  CRYPTO 1995»
11 years 12 months ago
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
Mihir Bellare, Roch Guérin, Phillip Rogaway
TIT
2010
130views Education» more  TIT 2010»
11 years 3 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
IJNSEC
2008
98views more  IJNSEC 2008»
11 years 8 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
10 years 12 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
books