2018
DOI: 10.1007/978-3-319-96884-1_21
|View full text |Cite
|
Sign up to set email alerts
|

Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
34
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(34 citation statements)
references
References 25 publications
0
34
0
Order By: Relevance
“…Published and new contents. In [8], Datta et al proposed DWCDM and showed that if the nonce space is restricted to 2n/3 bits, DWCDM is secured roughly up to 2 2n/3 MAC queries and 2 n verification queries against nonce respecting adversaries. Here we extend this result and prove that the result holds even if we restrict the nonce space to (n − 1)-bits.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Published and new contents. In [8], Datta et al proposed DWCDM and showed that if the nonce space is restricted to 2n/3 bits, DWCDM is secured roughly up to 2 2n/3 MAC queries and 2 n verification queries against nonce respecting adversaries. Here we extend this result and prove that the result holds even if we restrict the nonce space to (n − 1)-bits.…”
Section: Introductionmentioning
confidence: 99%
“…The basic structure remains same. We begin with the Extended Mirror Theory as was used in [8]. However, the result proven in [8] is valid when the block maximality (as defined in [16]) or equivalently component size is restricted to 2.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations