On fast and provably secure message authentication based on universal hashing

V Shoup - Annual International Cryptology Conference, 1996 - Springer
There are well-known techniques for message authentication using universal hash
functions. This approach seems very promising, as it provides schemes that are both …

Authenticated multi-party key agreement

M Just, S Vaudenay - … —ASIACRYPT'96: International Conference on the …, 1996 - Springer
We examine key agreement protocols providing (i) key authentication (ii) key confirmation
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …

[PDF][PDF] 物联网安全关键技术与挑战

武传坤 - 密码学报, 2015 - jcr.cacrnet.org.cn
物联网是信息技术发展到一定阶段的产物, 是全球信息产业和技术的又一次飞跃.
物联网的发展非常迅速, 市场潜力巨大. 同时, 物联网的信息安全问题是关系物联网产业能否安全 …

Cryptographic primitives for information authentication—State of the art

B Preneel - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
This paper describes the state of the art for cryptographic primitives that are used for
protecting the authenticity of information: cryptographic hash functions and digital signature …

Designated verifier signature schemes: Attacks, new security notions and a new construction

H Lipmaa, G Wang, F Bao - … , ICALP 2005, Lisbon, Portugal, July 11-15 …, 2005 - Springer
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …

[图书][B] Formal aspects of mobile code security

RD Dean - 1999 - search.proquest.com
We believe that formal methods of all kinds are critical to mobile code security, as one route
to gaining the assurance level necessary for running potentially hostile code on a routine …

Practice-oriented provable-security

M Bellare - International workshop on information security, 1997 - Springer
This short article is intended to complement my invited talk at this conference. 1 I would like
to try to introduce you to a certain, relatively new, sub-area of cryptography that we have …

Building prfs from prps

C Hall, D Wagner, J Kelsey, B Schneier - Advances in Cryptology …, 1998 - Springer
We evaluate constructions for building pseudo-random functions (PRFs) from pseudo-
random permutations (PRPs). We present two constructions: a slower construction which …

A new variant of PMAC: beyond the birthday bound

K Yasuda - Annual Cryptology Conference, 2011 - Springer
We propose a PMAC-type mode of operation that can be used as a highly secure MAC
(Message Authentication Code) or PRF (Pseudo-Random Function). Our scheme is based …

On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1

J Kim, A Biryukov, B Preneel, S Hong - International Conference on …, 2006 - Springer
HMAC is a widely used message authentication code and a pseudorandom function
generator based on cryptographic hash functions such as MD5 and SHA-1. It has been …