<--- Back to Details
First PageDocument Content
One-key MAC / Block cipher modes of operation / Permutation / Block cipher / CMAC / Message authentication codes / Combinatorics / Mathematics
Date: 2003-08-12 06:18:36
One-key MAC
Block cipher modes of operation
Permutation
Block cipher
CMAC
Message authentication codes
Combinatorics
Mathematics

Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Download Document from Source Website

File Size: 238,72 KB

Share Document on Facebook

Similar Documents

Spectral theory / Hermann Minkowski / Minkowski's second theorem / Operator theory / Mathematics / Dissipative operator

A proof of Minkowski’s second theorem Matthew Tointon Minkowski’s second theorem is a fundamental result from the geometry of numbers with important applications in additive combinatorics (see, for example, its appli

DocID: 1xVE5 - View Document

Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

DocID: 1xTm4 - View Document

C OLLOQUIUM ON C OMBINATORICS — 24/25 N OVEMBER 2017 D ISCRETE M ATHEMATICS — PADERBORN U NIVERSITY Dear combinatorialists, the Colloquium on Combinatorics was established in 1981 and has since been held annually in

DocID: 1vs4l - View Document

Combinatorics of Sets Po-Shen Loh June

DocID: 1vrUN - View Document

UNDERGRADUATE SEMINAR IN COMBINATORICS Michael Krivelevich Spring Semester 2014 Course number: When and where: Tuesdays 10-12, Kaplun 324. Prospective audience: the seminar is intended for third year undergradu

DocID: 1vrJ6 - View Document