References
- M. Bellare, J. Kilian, P. Rogaway, 'The security of cipher block chaining,' Advances in Cryptology-Crypto'94, Springer-Verlag, LNCS 839, pp.341-358, 1994. An updated version can be found in the personal URLs of the authors. See, for example, http://www-cse.ucsd.edu/users/mihir/
- J. Black and P. Rogaway, 'CBC MACs for arbitrary-length messages : the three-key constructions,' Advances in Cry-ptology-Crypto'2000, Springer-Verlag, LNCS 1880, pp.197-215, 2000
- L. Carter and M. Wegman, 'Universal hash functions,' J. of Computer and System Sciences, Vol.18, pp.143-154, 1979 https://doi.org/10.1016/0022-0000(79)90044-8
- V. Gligor and P. Donescu, 'Fast encryption and authentication : XCBC encryption and XECB authentication modes,' Contribution to NIST, Available at http://csrc.nist.gov/en cryption/modes/, April, 2001
- J. Kang, S. Shin, D. Hong and O. Yi, 'Provable security of KASUMI and 3GPP encryption mode f8,' Advances in Cryptology-ASIACRYPT '2001, Springer-Verlag, LNCS 2248, pp.255-271, 2001
- J. Kang, O. Yi, D. Hong, and H. Cho, 'Pseudorandomness of MISTY-type transformations and the block cipher KASUMI,' ACISP 2001, Springer-Verlag, LNCS 2119, pp.60-73, 2001
- M. Luby and C. Rackoff, 'How to construct pseudorandom permutations and pseudorandom functions,' SIAM J. Comput, Vol.17, pp.189-203, 1988
- E. Petrank, C. Rackoff, 'CBC MAC for Real-Time Data Source,' Journal of Cryptology, Vol.13, pp.315-338, 2000 https://doi.org/10.1007/s001450010009
- P. Rogaway, 'PMAC : A parallelizable message authentication code,' Contribution to NIST, Available at http:// csrc.nist.gov/encryption/modes/, April, 2001
- M. Wegman and L. Carter, 'New hash functions and their use in authentication and set equality,' J. of Computer and System Sciences, Vol.22, pp.265-279, 1981 https://doi.org/10.1016/0022-0000(81)90033-7
- 3G TS 35.201 'Specification of the 3GPP confidentiality and integrity algorithm ; Document 1 : f 8 and f 9 specifications,'