|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 32 occurrences of 15 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
200 | Soichi Furuya, Kouichi Sakurai |
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 327-341, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MAC, Block cipher, provable security, mode of operation |
158 | Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang |
On the Unprovable Security of 2-Key XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 230-238, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Blockcipher mode of operation, Provable security, Message authentication code, Related-key attack, Blockcipher |
116 | Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 |
Key Recovery Attacks on the RMAC, TMAC, and IACBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 265-273, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC |
84 | Kaoru Kurosawa, Tetsu Iwata |
TMAC: Two-Key CBC MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 33-49, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
block cipher, provable security, CBC MAC |
74 | Kazuhiko Minematsu, Toshiyasu Matsushima |
New Bounds for PMAC, TMAC, and XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 434-451, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Chris J. Mitchell |
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 155-167, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Tetsu Iwata, Kaoru Kurosawa |
Stronger Security Bounds for OMAC, TMAC, and XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 402-415, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Virgil D. Gligor, Pompiliu Donescu |
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 92-108, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 |
Towards Secure and Practical MACs for Body Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 182-198, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Tetsu Iwata, Kaoru Kurosawa |
OMAC: One-Key CBC MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 129-153, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Gregory V. Bard |
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 129-151, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB |
32 | Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi |
Towards Tight Security Bounds for OMAC, XCBC and TMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1234, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
32 | Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi |
Towards Tight Security Bounds for OMAC, XCBC and TMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I, pp. 348-378, 2022, Springer, 978-3-031-22962-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Jeremy Fischer, Eric Coulter, Richard Knepper, Charles Peck, Craig A. Stewart |
XCBC and XNIT - Tools for Cluster Implementation and Management in Research and Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2015 IEEE International Conference on Cluster Computing, CLUSTER 2015, Chicago, IL, USA, September 8-11, 2015, pp. 857-864, 2015, IEEE Computer Society, 978-1-4673-6598-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Paul E. Hoffman |
The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4434, pp. 1-6, February 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Paul E. Hoffman |
The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3664, pp. 1-4, January 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Sheila Frankel, Howard C. Herbert |
The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3566, pp. 1-11, September 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Tetsu Iwata, Kaoru Kurosawa |
Stronger Security Bounds for OMAC, TMAC and XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 82, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
21 | Mridul Nandi |
Fast and Secure CBC-Type MAC Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 375-393, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OMAC, padding rule, prf-security, CBC-MAC |
21 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 173-186, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
21 | Mridul Nandi |
A Simple and Unified Method of Proving Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 317-334, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | John Black, Phillip Rogaway |
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 18(2), pp. 111-131, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC |
21 | Dan Boneh, Richard A. DeMillo, Richard J. Lipton |
On the Importance of Eliminating Errors in Cryptographic Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 14(2), pp. 101-119, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC |
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|