We introduce the relationship between incremental cryptography and memory checkers. We present an incremental message authentication scheme based on the XOR MACs which supports insertion, deletion and other single block operations. Our scheme takes only a constant number of pseudorandom function evaluations for each update step and produces smaller authentication codes than the tree scheme presented in [BGG95]. Furthermore, it is secure against message substitution attacks, where the adversary is allowed to tamper messages before update steps, making it applicable to virus protection. From this scheme we derive memory checkers for data structures based on lists. Conversely, we use a lower bound for memory checkers to show that so-called mes...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
Message authentication codes (MACs) are widely used in communication networks for authentication pur...
A new message authentication code (MAC) is described that exploits the tree structure present in man...
International audienceIntroduced in cryptography by Bellare, Goldreich and Goldwasser in 1994, incre...
The goal of incremental cryptography is to design cryptographic algorithms with the property that ha...
We show lower bounds for the signature size of incremental schemes which are secure against substitu...
Abstract We define a new authentication tree in the symmetric key setting, which has the same comput...
every field, many applications rely on the existence of small devices that can exchange information ...
Abstract. We present ShMAC (Shallow MAC), a fixed input length message authentication code that perf...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
The verification of the authenticity of a text document or a datafile is one of the main application...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
The security of iterated message authentication code (MAC) algorithms is considered, and in particul...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
Message authentication codes (MACs) are widely used in communication networks for authentication pur...
A new message authentication code (MAC) is described that exploits the tree structure present in man...
International audienceIntroduced in cryptography by Bellare, Goldreich and Goldwasser in 1994, incre...
The goal of incremental cryptography is to design cryptographic algorithms with the property that ha...
We show lower bounds for the signature size of incremental schemes which are secure against substitu...
Abstract We define a new authentication tree in the symmetric key setting, which has the same comput...
every field, many applications rely on the existence of small devices that can exchange information ...
Abstract. We present ShMAC (Shallow MAC), a fixed input length message authentication code that perf...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
The verification of the authenticity of a text document or a datafile is one of the main application...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
The security of iterated message authentication code (MAC) algorithms is considered, and in particul...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message a...
Message authentication codes (MACs) are widely used in communication networks for authentication pur...