Leurent, G., Nandi, M., Sibleyras, F.: Generic attacks against beyond-birthday-bound MACs. Jha, A., Nandi, M.: Revisiting structure graphs: applications to CBC-MAC and EMAC. Iwata, T., Kurosawa, K.: OMAC: one-key CBC MAC. Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. 2018(3), 36–92 (2018)ĭen Boer, B.: A simple and key-economical unconditional authentication scheme. ĭatta, N., Dutta, A., Nandi, M., Paul, G.: Double-block hash-then-sum: a paradigm for constructing BBB secure PRF. īogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. īlack, J., Rogaway, P.: A block-cipher mode of operation for parallelizable message authentication. 61(3), 362–399 (2000)īierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On families of hash functions via geometric codes and concatenation. īellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. īellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. Keywordsīanik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: a small present. In this work, we study the security of deterministic MAC constructions with a double-block internal state, captured by the double-block hash-then-sum ( \(\mathsf \) queries.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |