Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
From MaRDI portal
Publication:3600218
DOI10.1007/978-3-540-85174-5_9zbMath1183.94035OpenAlexW2134079148MaRDI QIDQ3600218
Helena Handschuh, Bart Preneel
Publication date: 10 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_9
Related Items (17)
Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 ⋮ Partition oracles from weak key forgeries ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ The Missing Difference problem, and its applications to counter mode encryption ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Impossible Differential Properties of Reduced Round Streebog ⋮ Cryptanalysis of the AEAD and hash algorithm DryGASCON ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ On weak keys and forgery attacks against polynomial-based MAC schemes ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Weak Keys for AEZ, and the External Key Padding Attack ⋮ On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes ⋮ Об одном семействе универсальных функций хеширования ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC ⋮ Single-trace side-channel analysis on polynomial-based MAC schemes ⋮ Криптосистема блочного гаммирования с аутентификацией
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Universal hashing and authentication codes
- CBC MAC for real-time data sources
- A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
- Keying Hash Functions for Message Authentication
- Improving the Security of MACs Via Randomized Message Preprocessing
- MMH: Software message authentication in the Gbit/second rates
- On the security of iterated message authentication codes
- On the cardinality of systematic authentication codes via error-correcting codes
- Message Authentication on 64-Bit Architectures
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Fast Software Encryption
This page was built for publication: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms