A MAC mode for lightweight block ciphers

A Luykx, B Preneel, E Tischhauser… - Fast Software Encryption …, 2016 - Springer
… ’s protected counter sum using block ciphers. Another MAC algorithm designed for lightweight
use is Chaskey [30]. The Chaskey paper includes a block cipher and a permutation mode, …

Chaskey: an efficient MAC algorithm for 32-bit microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Selected Areas in …, 2014 - Springer
… We note that currently used MAC algorithms based on … On typical microcontrollers, the key
schedule of these block ciphers … that MAC algorithms based on reduced-round block ciphers

Combined differential, linear and related-key attacks on block ciphers and MAC algorithms

J Kim - Cryptology ePrint Archive, 2006 - eprint.iacr.org
… Firstly, we present their applications to the block ciphers SHACAL-1, SHACAL-2 and AES.
In particular, we show that the differential-nonlinear attack is applicable to 32-round SHACAL-…

New birthday attacks on some MACs based on block ciphers

Z Yuan, W Wang, K Jia, G Xu, X Wang - Annual International Cryptology …, 2009 - Springer
MACs based on block ciphers, and is divided into two parts. The first part presents new
distinguishers of the MAC construction Alred and its specific instance Alpha-MACMAC algorithm

New constructions of MACs from (tweakable) block ciphers

B Cogliati, J Lee, Y Seurin - IACR Transactions on Symmetric …, 2017 - tosc.iacr.org
… -based constructions studied in this paper will be done in the ideal cipher model (ICM):
this means that a block cipher E is drawn uniformly at random from the set of all block ciphers

Fast and secure CBC-type MAC algorithms

M Nandi - International Workshop on Fast Software Encryption, 2009 - Springer
… two fast and secure block cipher-based … Block Cipher based Mac: In this paper, we study
this category in more detail. These MACs are usually based on several invocations of a block

[PDF][PDF] MacDES: a new MAC algorithm based on DES

LR Knudsen, B Preneel - Electronics Letters, 1998 - esat.kuleuven.be
… The block length n and key length k of CBC-MAC are equal to block and key length of the
block cipher … to a multiple of the block length, and then divided into t blocks x1 through xt. The …

Chaskey: A mac algorithm for microcontrollers–status update and proposal of chaskey-12–

N Mouha - 2015 - inria.hal.science
… The focus of this paper is on Message Authentication Code (MAC) algorithms. MAC algorithms
… based on an underlying Even-Mansour block cipher, we refer to the original paper [12]. …

On the security of two MAC algorithms

B Preneel, PC Van Oorschot - International Conference on the Theory and …, 1996 - Springer
… primary MAC algorithms used historically have been CBC-MAC and MAA. CBC-MAC [lo,
111 is derived from the cipher-block chaining (CBC) mode of block ciphers such as DES; some …

[PDF][PDF] Minding your MAC algorithms

H Handschuh, B Preneel - Information Security Bulletin, 2004 - esat.kuleuven.be
… -MAC is an iterated MAC algorithm based on a block cipher. The encryption and decryption
with the block cipher … The block length of the block cipher is denoted with n, hence EK(.) and …