Cryptography Reference
In-Depth Information
References
1. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authen-
tication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer,
Heidelberg (1996)
2. Bellare, M., Guerin, R., Rogaway, P.: XOR MACs: New methods for message
authentication using finite pseudorandom functions. In: Coppersmith, D. (ed.)
CRYPTO 1995. LNCS, vol. 963, pp. 15-28. Springer, Heidelberg (1995)
3. Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Block Chaining
Message Authentication Code. Journal of Computer and System Sciences 61(3),
362-399 (2000)
4. Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH
authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-
MAC paradigm. ACM Transactions on Information and System Security 7(2), 241
(2004)
5. Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions
and analysis of the generic composition paradigm. Journal of Cryptology 21(4),
469-491 (2008)
6. Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B.,
Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389-407. Springer, Heidelberg
(2004)
7. Bernstein, D.: Floating-point arithmetic and message authentication. Unpublished
manuscript (2004), http://cr.yp.to/hash127.html
8. Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H.,
Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32-49. Springer, Heidelberg
(2005)
9. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and
Secure Message Authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS,
vol. 1666, pp. 216-233. Springer, Heidelberg (1999)
10. Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo-random Number
Generator. SIAM Journal on Computing 15, 364 (1986)
11. Bosselaers, A., Govaerts, R., Vandewalle, J.: Fast hashing on the Pentium. In:
Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 298-312. Springer, Heidel-
berg (1996)
12. Canetti, H., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use
for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS,
vol. 2045, pp. 453-472. Springer, Heidelberg (2001)
13. Carter, J., Wegman, M.: Universal classes of hash functions. In: Proceedings of
the Ninth Annual ACM Symposium on Theory of Computing STOC 1977, pp.
106-112. ACM, New York (1977)
14. Doraswamy, N., Harkins, D.: IPSec: the new security standard for the Internet,
intranets, and virtual private networks. Prentice Hall, Englewood Cliffs (2003)
15. Dworkin, M.: Recommendation for block cipher modes of operation: The CMAC
mode for authentication (2005)
16. Dworkin, M.: NIST Special Publication SP800-38D defining GCM and GMAC
(2007)
17. Etzel, M., Patel, S., Ramzan, Z.: Square hash: Fast message authentication via
optimized universal hash functions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS,
vol. 1666, pp. 234-251. Springer, Heidelberg (1999)
 
Search WWH ::




Custom Search