參?考?文?獻
[1] Bernstein, D. J., The Poly1305-AES message-authentication code. Proceedings of Fast Software Encryption 2005, LNCS 3557, pp. 32-49, Springer-Verlag, 2005
[2] Black, J., Halevi, S., Krawczyk, H., Krovetz, T. and Rogaway, P. UMAC: Fast and provably secure message authentication, Advances in Cryptology - CRYPTO ’99, LNCS vol. 1666, pp. 216-233, Springer-Verlag, 1999
[3] Boesgaard, M., Christensen, T. and Zenner, E. Badger. A fast and provably secure MAC, Proceedings of Applied Cryptography and Network Security, LNCS vol. 3531, pp. 176-191, Springer-Verlag, 2005
[4] Carter, L. and Wegman, M. Universal classes of hash functions, Journal of Computer and System Sciences, 18(1979), pp. 143-154
[5] Handschuh, H. and Preneel, B. Key-Recovery Attacks on Universal Hash Function based MAC Algorithms. Advances in Cryptology - CRYPTO ’08, LNCS vol. 5157, pp. 144-161, Springer-Verlag, 2008
[6] IETF RFC 4418, UMAC: Message Authentication Code using Universal Hashing, March 2006
[7] ISO/IEC 10181-6, Information technology –Open Systems Interconnection – Security frameworks for open systems: Integrity framework
[8] GB/T 17964-2008 , 《信息安全技術 分組密碼算法的工作模式》
[9] McGrew, D. and Viega, J. The Galois/Counter Mode of Operation (GCM). National Institute of Standards and Technology [web page], http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/, May 2005
[10] National Institute of Standards and Technology. NIST Special Publication 800-38D:Recommendation for Block Cipher Modes of Operation:Galois/Counter Mode(GCM) and GMAC. November 2007.
[11] Wegman, M. and Carter, L. New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, 22(1981), pp. 265-279
[12] Bozhan Su, Wenling Wu, and Wentao Zhang. Security of the sms4 block cipher against differential cryptanalysis. Journal of Computer Science and Technology, 26(1):130-138, 2011
[13] Mingjie Liu, Jiazhe Chen. Improved Linear Attacks on the Chinese Block Cipher Standard. Journal of Computer Science and Technology. November 2014, Volume 29, Issue 6, pp. 1123-1133
GB/T 15852.3—2019 信息技術 安全技術 消息鑒別碼 第3部分:采用泛雜湊函數的機制
推薦文章: