The Security of Cipher Block Chaining
Top Cited Papers
- 13 July 2001
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
- p. 341-358
- https://doi.org/10.1007/3-540-48658-5_32
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- On message integrity in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Entity Authentication and Key DistributionPublished by Springer Science and Business Media LLC ,2001
- Optimal asymmetric encryptionLecture Notes in Computer Science, 1995
- Differential Attack on Message Authentication CodesLecture Notes in Computer Science, 1994
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- A hard-core predicate for all one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- Pseudo-random generation from one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986