<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    參?考?文?獻

    • [1] Bernstein, D. J., The Poly1305-AES message-authentication code. Proceedings of Fast Software Encryption 2005, LNCS 3557, pp. 32-49, Springer-Verlag, 2005

    • [2] Black, J., Halevi, S., Krawczyk, H., Krovetz, T. and Rogaway, P. UMAC: Fast and provably secure message authentication, Advances in Cryptology - CRYPTO ’99, LNCS vol. 1666, pp. 216-233, Springer-Verlag, 1999

    • [3] Boesgaard, M., Christensen, T. and Zenner, E. Badger. A fast and provably secure MAC, Proceedings of Applied Cryptography and Network Security, LNCS vol. 3531, pp. 176-191, Springer-Verlag, 2005

    • [4] Carter, L. and Wegman, M. Universal classes of hash functions, Journal of Computer and System Sciences, 18(1979), pp. 143-154

    • [5] Handschuh, H. and Preneel, B. Key-Recovery Attacks on Universal Hash Function based MAC Algorithms. Advances in Cryptology - CRYPTO ’08, LNCS vol. 5157, pp. 144-161, Springer-Verlag, 2008

    • [6] IETF RFC 4418, UMAC: Message Authentication Code using Universal Hashing, March 2006

    • [7] ISO/IEC 10181-6, Information technology –Open Systems Interconnection – Security frameworks for open systems: Integrity framework

    • [8] GB/T 17964-2008 , 《信息安全技術 分組密碼算法的工作模式》

    • [9] McGrew, D. and Viega, J. The Galois/Counter Mode of Operation (GCM). National Institute of Standards and Technology [web page], http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/, May 2005

    • [10] National Institute of Standards and Technology. NIST Special Publication 800-38D:Recommendation for Block Cipher Modes of Operation:Galois/Counter Mode(GCM) and GMAC. November 2007.

    • [11] Wegman, M. and Carter, L. New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, 22(1981), pp. 265-279

    • [12] Bozhan Su, Wenling Wu, and Wentao Zhang. Security of the sms4 block cipher against differential cryptanalysis. Journal of Computer Science and Technology, 26(1):130-138, 2011

    • [13] Mingjie Liu, Jiazhe Chen. Improved Linear Attacks on the Chinese Block Cipher Standard. Journal of Computer Science and Technology. November 2014, Volume 29, Issue 6, pp. 1123-1133

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类