Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference39 articles.
1. American National Standards Institution. ANSI X9.71, Keyed hash message authentication code (ABA, Washington, D.C., 2000)
2. E. Barkan, E. Biham, A. Shamir, Rigorous bounds on cryptanalytic time/memory tradeoffs, in C. Dwork ed., Advances in Cryptology–CRYPTO’06. LNCS, vol. 4117 (Springer, Berlin, Heidelberg, 2006)
3. M. Bellare, New proofs for NMAC and HMAC: security without collision-resistance. Preliminary version of this paper, in C. Dwork ed., Advances in Cryptology–CRYPTO’06. LNCS, vol. 4117 (Springer, Berlin, Heidelberg, 2006)
4. M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in N. Koblitz ed., Advances in Cryptology–CRYPTO’96. LNCS, vol. 1109 (Springer, Berlin, Heidelberg, 1996)
5. M. Bellare, R. Canetti, H. Krawczyk, Pseudorandom functions revisited: the cascade construction and its concrete security.
http://www-cse.ucsd.edu/users/mihir
. (Preliminary version in Proceedings of the 37th Symposium on Foundations of Computer Science (IEEE, 1996)
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献