Computer Science ›› 2017, Vol. 44 ›› Issue (3): 192-194.doi: 10.11896/j.issn.1002-137X.2017.03.041
Previous Articles Next Articles
TIAN Yu-dan and WEI Yong-zhuang
[1] GILBERT E,MACWILLIAMS F,SLOANE N.Codes which detect deception[J].Bell System Technical Journal,1974,3(3):405-424. [2] PRENEEL B,VAN P Oorschot.MD-x MAC and building fast MACs from hash functions[C]∥Advances in Cryptology-Crypto 95 Proceedings.Lecture Notes in Computer Science,Vol.963,D.Coppersmith ed.,Springer-Verlag,1995. [3] aSecure Hash Standardo.Federal Information Processing Stand-ards Publication 180-1[J].Us Dept of Commerce/nist National Technical Information Service, 1995. [4] WANG P,FENG D G.To construct the MAC based on block cipher [J].Graduate School of Chinese Academy of Scien-ces Journa,2005,22(6):746-750.(in Chinese) 王鹏,冯登国.基于可调分组密码的MAC构造[J].中国科学院研究生院学报,2005,22(6):746-750. [5] ISO/IEC 9797-1.Information technology-security techniques mes-sage authentication code(MACs)-part 1:Mechanism using a block cipher[S].International organization for standardization.geneve,swizerland,1999. [6] BLACK J,ROGAWAY P.A block-cipher mode of operation for parallelizable message authentication[M]∥Lecture Notes in Computer Science 2332:Advances in cryptology-eurocrypt.2002:384-397. [7] SARKAR P.Pseudo-random functions and parallelizable modes of operations of a block cipher[J].IEEE Transactions on Information Theory,2010,6(8):4025-4037. [8] CAESAR-competition for authenticated encryption:security,applicability,and robustness.http://competitions.cr.yp.to/caesar.html. [9] NASOUR B,JAVAD A,MOHAMMAD R.A single query forgery on avalanchev1[R].Cryptographic Competitions Mailing List,2014. [10] GUY B.Forgery on stateless cmcc.http://eprint.iacr.org. [11] CHAKRABORTY D,NANDI M.Attacks on the authenticated encryption mode of operation PAE[J].IEEE Transaction on Information Theory,2015,1(10):5636-5642 . [12] BRINCAT K,MITCHELL C.New CBC-MAC forgery attacks[C]∥varadharajan,V,Mu,Y.(eds.) ACISP 2001.LNCS,Springer,Heidelberg,2119:3-14. [13] CHEN J,HU Y P,WEI Y Z.A random message forgery attack on PMAC and TMAC-V[J].Chinese Journal of Computers,2007,30(10):1827-1832.(in Chinese) 陈杰,胡予濮,韦永壮.随机消息伪造攻击PMAC和TMAC-V[J].计算机学报,2007,30(10):1827-1832. [14] CHAO S D,ZHANG Z L,TIAN H,et al.Improved PMAC and security analysis[J].Computer Engineering and Applications,2009,45(21):77-78.(in Chinese) 晁仕德,张绍兰,田华,等.改进的PMAC及安全性分析[J].计算机工程与应用,2009,45(21):77-78. |
No related articles found! |
|