CBC MAC for real-time data sources
From MaRDI portal
Publication:1573769
DOI10.1007/s001450010009zbMath0953.94023OpenAlexW2022521688WikidataQ127125064 ScholiaQ127125064MaRDI QIDQ1573769
Erez Petrank, Charles W. Rackoff
Publication date: 8 August 2000
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s001450010009
Related Items (16)
PMAC with Parity: Minimizing the Query-Length Influence ⋮ The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC ⋮ Revisiting structure graphs: applications to CBC-MAC and EMAC ⋮ CBCR: CBC MAC with rotating transformations ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ TrCBC: another look at CBC-MAC ⋮ Key-reduced variants of 3Kf9 with beyond-birthday-bound security ⋮ On the Unprovable Security of 2-Key XCBC ⋮ Security models and proof strategies for plaintext-aware encryption ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ The security of the cipher block chaining message authentication code ⋮ The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ A New Mode of Operation for Block Ciphers and Length-Preserving MACs ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ On the security of \textsf{TrCBC}
This page was built for publication: CBC MAC for real-time data sources