Abstract. Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this MAC recovering its internal state just after 29 measurements in the known-message scenario which is to be compared to 40 measurements required by collision attacks on AES in the chosen-plaintext scenario. Having recovered the internal state, we mount a selective forgery attack using new 4 to 1 round collisions working with negligible memory...
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of p...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of p...
peer reviewedMessage Authentication Code construction Alred and its AES-based instance Alpha-MAC wer...
peer reviewedMessage Authentication Code construction Alred and its AES-based instance Alpha-MAC wer...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
Abstract. The security of two message authentication code (MAC) al-gorithms is considered: the MD5-b...
Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compro...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
Abstract In cryptography, secure channels enable the confidential and authenticated message exchange...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of p...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of p...
peer reviewedMessage Authentication Code construction Alred and its AES-based instance Alpha-MAC wer...
peer reviewedMessage Authentication Code construction Alred and its AES-based instance Alpha-MAC wer...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
Abstract. The security of two message authentication code (MAC) al-gorithms is considered: the MD5-b...
Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compro...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
Abstract In cryptography, secure channels enable the confidential and authenticated message exchange...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of p...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of p...