Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom functions (PRFs). In this work we propose a wide variety of other approaches to building efficient MACs, without going through a PRF first. In particular, unlike deterministic PRF-based MACs, where each message has a unique valid tag, we give a number of probabilistic MAC constructions from various other primitives/assumptions. Our main results are summarized as follows: We show several new probabilistic MAC constructions from a variety of general assumptions, including CCA-secure encryption, Hash Proof Systems and key-homomorphic weak PRFs. By instantiating these frameworks under concrete number theoretic assumptions, we get several schemes ...
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is co...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
Security against related-key attacks is an important criteria for modern cryptographic constructions...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Message Authentication Code (MAC) is one of most basic primitives in cryptography. After Biham (EURO...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authenticatio...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC...
In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is co...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
Security against related-key attacks is an important criteria for modern cryptographic constructions...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Message Authentication Code (MAC) is one of most basic primitives in cryptography. After Biham (EURO...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authenticatio...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC...
In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is co...
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional b...
Security against related-key attacks is an important criteria for modern cryptographic constructions...