Keyword : message authentication code


On the Full MAC Security of a Double-Piped Mode of Operation
Kan YASUDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 84-91
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Identification
Keyword: 
domain extensionunpredictabilityunforgeabilitymessage authentication codeMACbirthday bound
 Summary | Full Text:PDF

A MAC Forgery Attack on SOBER-128
Dai WATANABE Soichi FURUYA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5 ; pp. 1166-1172
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
stream ciphermessage authentication codeauthenticated encryptiondifferential cryptanalysisSOBER
 Summary | Full Text:PDF

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions
Xiangyong ZENG Lei HU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 305-310
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modular reductionEuclidean ringlatticeuniversal hash function familymessage authentication code
 Summary | Full Text:PDF

On the Security of a MAC by Mitchell
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 25-32
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
message authentication codeOMACsecurity proofssecurity gappseudorandom permutation
 Summary | Full Text:PDF

A Note on the Strength of Weak Collision Resistance
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1092-1097
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hash functionweak collision resistancemessage authentication codeNMAC
 Summary | Full Text:PDF