Does Encryption with Redundancy Provide Authenticity?
- 15 April 2001
- book chapter
- Published by Springer Nature
- p. 512-528
- https://doi.org/10.1007/3-540-44987-6_31
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- The Security of the Cipher Block Chaining Message Authentication CodeJournal of Computer and System Sciences, 2000
- Advances in Cryptology — CRYPTO 2000Published by Springer Nature ,2000
- Agent Systems, Mobile Agents, and ApplicationsPublished by Springer Nature ,2000
- UMAC: Fast and Secure Message AuthenticationPublished by Springer Nature ,1999
- Cryptographic Primitives for Information Authentication — State of the ArtPublished by Springer Nature ,1998
- Bucket Hashing and its Application to Fast Message AuthenticationPublished by Springer Nature ,1995
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979