Sciweavers

CRYPTO
1999
Springer
87views Cryptology» more  CRYPTO 1999»
13 years 11 months ago
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
We prove the equivalence of two definitions of non-malleable encryption appearing in the literature— the original one of Dolev, Dwork and Naor and the later one of Bellare, Desa...
Mihir Bellare, Amit Sahai
CRYPTO
1999
Springer
72views Cryptology» more  CRYPTO 1999»
13 years 11 months ago
A Forward-Secure Digital Signature Scheme
Mihir Bellare, Sara K. Miner
CRYPTO
1999
Springer
87views Cryptology» more  CRYPTO 1999»
13 years 11 months ago
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier
Mihir Bellare, Oded Goldreich, Hugo Krawczyk
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
13 years 11 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...