On the Security of Two MAC Algorithms
- 1 January 1996
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- A Message Authenticator Algorithm Suitable for a Mainframe ComputerPublished by Springer Nature ,2000
- Keying Hash Functions for Message AuthenticationPublished by Springer Nature ,1996
- Bucket Hashing and its Application to Fast Message AuthenticationPublished by Springer Nature ,1995
- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom FunctionsPublished by Springer Nature ,1995
- Fast Software EncryptionPublished by Springer Nature ,1995
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Nature ,1993
- Message authentication with one-way hash functionsACM SIGCOMM Computer Communication Review, 1992
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Computer losses in 1988 - A reviewComputer Law & Security Review, 1989