ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
27
views
3
references
Top references
cited by
47
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,448
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
The Security of the Cipher Block Chaining Message Authentication Code
Author(s):
Mihir Bellare
,
Joe Kilian
,
Phillip Rogaway
Publication date
Created:
December 2000
Publication date
(Print):
December 2000
Journal:
Journal of Computer and System Sciences
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Further versions
open (via crossref license)
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal of Health Sciences
Most cited references
3
Record
: found
Abstract
: not found
Article
: not found
New hash functions and their use in authentication and set equality
Mark Wegman
,
J.Lawrence Carter
(1981)
0
comments
Cited
266
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On message integrity in cryptographic protocols
S.G. Stubblebine
,
V.D. Gligor
(1992)
0
comments
Cited
9
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Chosen-text attack on CBC-MAC
L.R. Knudsen
(1997)
0
comments
Cited
5
times
– based on
0
reviews
Review now
Bookmark
All references
Author and article information
Journal
Title:
Journal of Computer and System Sciences
Abbreviated Title:
Journal of Computer and System Sciences
Publisher:
Elsevier BV
ISSN (Print):
00220000
Publication date Created:
December 2000
Publication date (Print):
December 2000
Volume
: 61
Issue
: 3
Pages
: 362-399
Article
DOI:
10.1006/jcss.1999.1694
SO-VID:
01edf217-b0ba-4062-ad0e-43a8c1f74b44
Copyright ©
© 2000
License:
http://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,448
A Statistical Saturation Attack against the Block Cipher PRESENT
Authors:
B. Collard
,
F. Standaert
Analysis of the stream cipher RC4. Master's Thesis
Authors:
I Mantin
Chaos for Stream Cipher
Authors:
Ninan Sajeeth Philip
,
K. Joseph
See all similar
Cited by
47
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
Authors:
Phillip Rogaway
A Provable-Security Treatment of the Key-Wrap Problem
Authors:
Phillip Rogaway
,
Thomas Shrimpton
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
Authors:
Mihir Bellare
,
Tadayoshi Kohno
See all cited by
Most referenced authors
28
J Carter
Ronald L. Rivest
R.L. Rivest
See all reference authors