The Security of Cipher Block Chaining
Top Cited Papers
- 13 July 2001
- book chapter
- Published by Springer Nature
- p. 341-358
- https://doi.org/10.1007/3-540-48658-5_32
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- On message integrity in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Optimal asymmetric encryptionPublished by Springer Nature ,1995
- Differential Attack on Message Authentication CodesPublished by Springer Nature ,1994
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- A hard-core predicate for all one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- Pseudo-random generation from one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986