𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Security of message authentication codes in the presence of key-dependent messages

✍ Scribed by Madeline González Muñiz, Rainer Steinwandt


Book ID
113064407
Publisher
Springer
Year
2011
Tongue
English
Weight
171 KB
Volume
64
Category
Article
ISSN
0925-1022

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


The Security of the Cipher Block Chainin
✍ Mihir Bellare; Joe Kilian; Phillip Rogaway 📂 Article 📅 2000 🏛 Elsevier Science 🌐 English ⚖ 286 KB 👁 2 views

Let F be some block cipher (eg., DES) with block length l. The cipher block chaining message authentication code (CBC MAC) specifies that an m-block message x=x 1 } } } x m be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of y m , where y 0 =0 l

Hidden messages: evaluating the efficien
✍ Andy Cockburn; Matthew Smith 📂 Article 📅 2003 🏛 Elsevier Science 🌐 English ⚖ 504 KB

Text elision is a user interface technique that aims to improve the efficiency of navigating through information by allowing regions of text to be 'folded' into and out of the display. Several researchers have argued that elision interfaces are particularly suited to source code editing because they