Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bit value is encrypted, say with a block-cipher. The security of this scheme is proportional to εq2, where q is the number of MACs the adversary can request. As ε is at least 2−k, the best one can hope for is O(q2/2k) security. Unfortunately, such small ε is not achieved by simple hash functions used in practice, such as the polynomial evaluation or the Merkle-Damg̊ard construction, where ε grows with the message length L. The main insight of this work comes from the fact that, by using random-ized message preprocessing via a short random salt p (which must then be sent...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
The best MACs in the cryptographic narrative are based on universal hashing. The major cause followi...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
International audienceLightweight cryptography is a topic of growing importance, with the goal to se...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
The best MACs in the cryptographic narrative are based on universal hashing. The major cause followi...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
International audienceLightweight cryptography is a topic of growing importance, with the goal to se...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...