|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 32 occurrences of 15 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
200 | Soichi Furuya, Kouichi Sakurai |
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
MAC, Block cipher, provable security, mode of operation |
158 | Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang |
On the Unprovable Security of 2-Key XCBC. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Blockcipher mode of operation, Provable security, Message authentication code, Related-key attack, Blockcipher |
116 | Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 |
Key Recovery Attacks on the RMAC, TMAC, and IACBC. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC |
84 | Kaoru Kurosawa, Tetsu Iwata |
TMAC: Two-Key CBC MAC. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
block cipher, provable security, CBC MAC |
74 | Kazuhiko Minematsu, Toshiyasu Matsushima |
New Bounds for PMAC, TMAC, and XCBC. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Chris J. Mitchell |
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Tetsu Iwata, Kaoru Kurosawa |
Stronger Security Bounds for OMAC, TMAC, and XCBC. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Virgil D. Gligor, Pompiliu Donescu |
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 |
Towards Secure and Practical MACs for Body Sensor Networks. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Tetsu Iwata, Kaoru Kurosawa |
OMAC: One-Key CBC MAC. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Gregory V. Bard |
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB |
32 | Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi |
Towards Tight Security Bounds for OMAC, XCBC and TMAC. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
32 | Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi |
Towards Tight Security Bounds for OMAC, XCBC and TMAC. |
ASIACRYPT (1) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Jeremy Fischer, Eric Coulter, Richard Knepper, Charles Peck, Craig A. Stewart |
XCBC and XNIT - Tools for Cluster Implementation and Management in Research and Training. |
CLUSTER |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Paul E. Hoffman |
The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE). |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Paul E. Hoffman |
The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE). |
RFC |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Sheila Frankel, Howard C. Herbert |
The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec. |
RFC |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Tetsu Iwata, Kaoru Kurosawa |
Stronger Security Bounds for OMAC, TMAC and XCBC. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
21 | Mridul Nandi |
Fast and Secure CBC-Type MAC Algorithms. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
OMAC, padding rule, prf-security, CBC-MAC |
21 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
21 | Mridul Nandi |
A Simple and Unified Method of Proving Indistinguishability. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
21 | John Black, Phillip Rogaway |
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC |
21 | Dan Boneh, Richard A. DeMillo, Richard J. Lipton |
On the Importance of Eliminating Errors in Cryptographic Computations. |
J. Cryptol. |
2001 |
DBLP DOI BibTeX RDF |
Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC |
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|