Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions
- 16 December 1999
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 252-269
- https://doi.org/10.1007/3-540-48405-1_16
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Pseudorandom functions revisited: the cascade construction and its concrete securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Incremental cryptography and application to virus protectionPublished by Association for Computing Machinery (ACM) ,1995
- Fast Software EncryptionPublished by Springer Science and Business Media LLC ,1995
- Universal one-way hash functions and their cryptographic applicationsPublished by Association for Computing Machinery (ACM) ,1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979