Distinguishing and Second-Preimage Attacks on CBC-Like MACs
- 1 January 2009
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- A New Mode of Operation for Block Ciphers and Length-Preserving MACsPublished by Springer Science and Business Media LLC ,2008
- TMAC: Two-Key CBC MACLecture Notes in Computer Science, 2003
- OMAC: One-Key CBC MACLecture Notes in Computer Science, 2003
- A Block-Cipher Mode of Operation for Parallelizable Message AuthenticationLecture Notes in Computer Science, 2002
- The Security of Cipher Block ChainingPublished by Springer Science and Business Media LLC ,2001
- New CBC-MAC Forgery AttacksLecture Notes in Computer Science, 2001
- CBC MACs for Arbitrary-Length Messages: The Three-Key ConstructionsLecture Notes in Computer Science, 2000
- Key Recovery and Forgery Attacks on the MacDES MAC AlgorithmLecture Notes in Computer Science, 2000
- Attacks on MacDES MAC algorithmElectronics Letters, 1999
- Chosen-text attack on CBC-MACElectronics Letters, 1997