A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
From MaRDI portal
Publication:3627438
DOI10.1007/978-3-642-01001-9_14zbMath1239.94079OpenAlexW1530627085MaRDI QIDQ3627438
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_14
Related Items (2)
A simple variant of the Merkle-Damgård scheme with a permutation ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Proof of Security in O(2 n ) for the Benes Scheme
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- On the security of iterated message authentication codes
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Feistel Networks Made Public, and Applications
- Merkle-Damgård Revisited: How to Construct a Hash Function
- A Failure-Friendly Design Principle for Hash Functions
- Multilane HMAC— Security beyond the Birthday Limit
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Automata, Languages and Programming
- Theory of Cryptography
This page was built for publication: A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier