Progress in Cryptology - INDOCRYPT 2003
From MaRDI portal
Publication:5429144
DOI10.1007/b94593zbMath1123.94348OpenAlexW753701005MaRDI QIDQ5429144
Publication date: 29 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b94593
provable securitymodes of operationOMACBlock ciphersTMACXCBCMessage authentication codes (MACs)Secret key cryptography
Related Items (8)
On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Revisiting structure graphs: applications to CBC-MAC and EMAC ⋮ Attacks and Security Proofs of EAX-Prime ⋮ TrCBC: another look at CBC-MAC ⋮ Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ On cryptographic properties of the $CVV$ and $PVV$ parameters generation procedures in payment systems ⋮ Practical significance of security bounds for standardized internally re-keyed block cipher modes
Uses Software
This page was built for publication: Progress in Cryptology - INDOCRYPT 2003