G Leurent, T Peyrin, L Wang - … 2013: 19th International Conference on the …, 2013 - Springer
In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven …
P Gaži, K Pietrzak, M Rybár - IACR Transactions on Symmetric …, 2016 - tosc.iacr.org
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a (pseudo) random permutation …
M Rivain, E Prouff, J Doget - International Workshop on Cryptographic …, 2009 - Springer
Abstract Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are …
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At …
J Black, P Rogaway - NIST Second Modes of Operation Workshop …, 2001 - cs.colorado.edu
The CBC MAC is the customary way to make a message authentication code (MAC) from a block cipher. It is the subject of several standards, including [1, 5, 6]. It is well-known and …
M Nandi - International Workshop on Fast Software Encryption, 2009 - Springer
The CBC− MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure …
CS Jutla - International conference on the theory and applications …, 2001 - Springer
We define a new mode of operation for block encryption which in addition to assuring confidentiality also assures message integrity. In contrast, previously for message integrity a …
This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications …
K Yasuda - Topics in Cryptology-CT-RSA 2010: The …, 2010 - Springer
We present a new message authentication code (MAC) based on block ciphers. Our new MAC algorithm, though twice as slow as an ordinary CBC MAC, can be proven to be a …