1 |
ISO/IEC 9797-1. Information technologySecurity techniques-Message Authentication Codes 35:1626-1627, 1999
|
2 |
K. Kurosawa and T. Iwata, 'TMAC : Two-Key CBC-MAC'. Topics in Cryptology-CT-RSA 2003. LNCS 2612, pp. 33-49. Springer-Verlag, 2003
|
3 |
J. Black and P. Rogaway. 'A Block Cipher Mode of Operation for Parallelizable Message Authentication' Advances in Cryptology-Eurocrypt 2002. LNCS 2332, pp.384-397, Springer-Verlag. 2002
|
4 |
J. Sung, D. Hong, and S. Lee. 'Key Recovery Attacks on the RMAC, TMAC. and IACBC', ACISP 2003, LNCS 2727, pp 265-273, SpringerVerlag, 2003
|
5 |
J. Black and P. Rogaway. 'CBC MACs for arbitrary-length messages: The three key construction', Advances in Cryptology - Crypto 2000. LNCS 1880. pp.197-215. Springer-Verlag. 2000
|
6 |
T. Iwata and K. Kurosawa. 'OMAC : One-Key CBC MAC, FSE 2003, LNCS 2887, pp 137-162, Springer-Verlag, 2003
|
7 |
C. J. Mitchell. 'On the Security of XCBC, TMAC, and OMAC', Technical Report RHUL-MA-2003-4, 19, August, 2003
|
8 |
M. Bellare, J. Kilian. and P. Rogaway. 'The Security of the Cipher Block Chaining Message Authentication Code', Advanced in Cryptology-CRYPTO'94 LNCS 839, pp. 341-358, SpringerVerlag, 1994
|