The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness of the random salt which restricts the security to birthday bound of the salt size due to the collision on random salts (e.g XMACR). To overcome the birthday bound limit, the natural approach to use (a) either a larger random salt (e.g MACRX3 uses 3n bits of random salt where n is the input and output size of the underlying non-compressing pseudorandom function or PRF) or (b) a PRF with increased domain size (e.g RWMAC or Randomized WMAC). Enhanced Hashthen- Mask (EHtM), proposed by Minematsu in FSE 2010, is the first probabilistic MAC scheme that provides beyond birthday bound security without increasing the randomness of the salt and the do...
Abstract. MACs (Message Authentication Codes) are widely adopted in communication systems to ensure ...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
PMAC is a rate-1, parallelizable, block-cipher-based message authentication code (MAC), proposed by ...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Abstract. In this paper, we study the security of randomized CBC– MACs and propose a new constructio...
Abstract. MACs (Message Authentication Codes) are widely adopted in communication systems to ensure ...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
Abstract. The security of randomized message authentication code, MAC for short, is typically depend...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
PMAC is a rate-1, parallelizable, block-cipher-based message authentication code (MAC), proposed by ...
Abstract. “Hash then encrypt ” is an approach to message authentica-tion, where first the message is...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Abstract. In this paper, we study the security of randomized CBC– MACs and propose a new constructio...
Abstract. MACs (Message Authentication Codes) are widely adopted in communication systems to ensure ...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...