Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- 20 August 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- Improving the Security of MACs Via Randomized Message PreprocessingLecture Notes in Computer Science, 2007
- New Proofs for NMAC and HMAC: Security Without Collision-ResistanceLecture Notes in Computer Science, 2006
- The Poly1305-AES Message-Authentication CodeLecture Notes in Computer Science, 2005
- OMAC: One-Key CBC MACLecture Notes in Computer Science, 2003
- On Families of Hash Functions via Geometric Codes and ConcatenationPublished by Springer Science and Business Media LLC ,2001
- The Security of Cipher Block ChainingPublished by Springer Science and Business Media LLC ,2001
- UMAC: Fast and Secure Message AuthenticationLecture Notes in Computer Science, 1999
- Square Hash: Fast Message Authentication via Optimized Universal Hash FunctionsLecture Notes in Computer Science, 1999
- MMH: Software message authentication in the Gbit/second ratesLecture Notes in Computer Science, 1997
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979