Abstract. We revisit the randomized approach followed in the design of the RMAC message authentication code in order to construct a MAC with similar properties, but based on Wegman-Carter’s ε-universal hash families instead of a classical CBC chain. This yields a new message authentication code called FRMAC whose security bounds are, as in RMAC, beyond the birthday paradox limit. With efficient hash functions in software, the performance of FRMAC for large messages is similar to those of the fastest previously known schemes. FRMAC can also be more efficient for small messages. Furthermore, due to relaxed requirements about the nonces in the security proof, the implementation of FRMAC in real applications tends to be easier
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
Abstract. In this paper, we study the security of randomized CBC– MACs and propose a new constructio...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We revisit the randomized approach followed in the design of the RMAC message authentication code i...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
The verification of the authenticity of a text document or a datafile is one of the main application...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
Abstract. In this paper we provide a simple, concrete and improved security analysis of PMAC, a Para...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
Abstract. In this paper, we study the security of randomized CBC– MACs and propose a new constructio...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We revisit the randomized approach followed in the design of the RMAC message authentication code i...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
The verification of the authenticity of a text document or a datafile is one of the main application...
With the introduction of electronic form of data, the need for an automatic system of security to pr...
Abstract. In this paper we provide a simple, concrete and improved security analysis of PMAC, a Para...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
Abstract. In this paper, we study the security of randomized CBC– MACs and propose a new constructio...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...