Back to Results
First PageMeta Content
CBC-MAC / Block cipher modes of operation / Block cipher / Cryptographic hash function / One-key MAC / PMAC / Message authentication codes / Cryptography / CMAC


Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2
Add to Reading List

Document Date: 2009-01-12 22:27:24


Open Document

File Size: 194,42 KB

Share Result on Facebook

Company

Knudsen / Guangwu Xu4 Key Laboratory / /

Country

China / /

/

Facility

University of Wisconsin-Milwaukee / Tsinghua University / Guangwu Xu4 Key Laboratory of Cryptographic Technology / Technology Institute / Shandong University / /

IndustryTerm

e - commerce / exhaustive search / Internet communication protocols / retail / /

Organization

Organization of the Paper / Beijing Electronic Science and Technology Institute / Tsinghua University / Beijing / University of Wisconsin-Milwaukee / Department of Electrical Engineering and Computer Science / Center for Advanced Study / Ministry of Education / Shandong University / Jinan / /

Position

Young Scientist / /

Technology

encryption / Alpha / block cipher / Internet communication protocols / MAC algorithms / secret key / MAC algorithm / signing algorithm / two key triple encryption / GUi / /

SocialTag