Revisiting structure graphs: Applications to CBC-MAC and EMAC
In [2], Bellare, Pietrzak and Rogaway proved an O(ℓq2/2n)${O(\ell q^{2}/2^{n})}$ bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation Π, provided ℓ<2n/3${\ell<2^{n/3}}$. Here an adversary can make at most q prefix-free queries each having at...
Main Authors: | Jha Ashwin, Nandi Mridul |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2016-12-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2016-0030 |
Similar Items
-
Mixing Times of Markov Chains on Degree Constrained Orientations of Planar Graphs
by: Stefan Felsner, et al.
Published: (2017-02-01) -
Accountable multi-authority attribute-based data access control in smart grids
by: Leyou Zhang, et al.
Published: (2023-07-01) -
Persisting randomness in randomly growing discrete structures: graphs and search trees
by: Rudolf Grübel
Published: (2015-10-01) -
On The Exact Security of Message Authentication Using Pseudorandom Functions
by: Ashwin Jha, et al.
Published: (2017-03-01) -
Texture representation via analysis and synthesis with generative adversarial networks
by: Jue Lin, et al.
Published: (2023-12-01)