Browsing Combinatorics and Optimization by Subject "Security"
Now showing items 1-1 of 1
-
MAC Constructions: Security Bounds and Distinguishing Attacks
(University of Waterloo, 2007-05-18)We provide a simple and improved security analysis of PMAC, a Parallelizable MAC (Message Authentication Code) defined over arbitrary messages. A similar kind of result was shown by Bellare, Pietrzak and Rogaway at ...