<--- Back to Details
First PageDocument Content
CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage
Date: 2001-09-12 12:24:34
CBC-MAC
CMAC
Block cipher
Pseudorandom function family
Feistel cipher
Pseudorandomness
Unpredictable permutation
Index of cryptography articles
Cryptography
Message authentication codes
Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Download Document from Source Website

File Size: 397,93 KB

Share Document on Facebook

Similar Documents

Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI  GOLDWASSER,

Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

DocID: 1r1z1 - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

DocID: 1nAAh - View Document

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

DocID: 1l4eX - View Document

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

DocID: 1kE9w - View Document