How to Thwart Birthday Attacks against MACs via Small Randomness
From MaRDI portal
Publication:3577961
DOI10.1007/978-3-642-13858-4_13zbMath1279.94136OpenAlexW1768774392MaRDI QIDQ3577961
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_13
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (7)
BBB Secure Nonce Based MAC Using Public Permutations ⋮ Improved multi-user security using the squared-ratio method ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC ⋮ Multi-user BBB security of public permutations based MAC
This page was built for publication: How to Thwart Birthday Attacks against MACs via Small Randomness