@inproceedings{34a871f744c349719ce8498b43390c1a,
title = "XOR MACs: New methods for message authentication using finite pseudorandom functions",
abstract = "We describe a new approach for authenticating a message using a finite pseudorandom function (PRF). Our “XOR MACs” have several nice features, including parallelizability, incrementality, and provable security. The finite PRF can be “instantiated” via DES (yielding an alternative to the CBC MAC), via the compression function of MD5 (yielding an alternative to various “keyed MD5” constructions), or in a variety of other ways. The proven security is quantitative, expressing the adversary{\textquoteright}s inability to forge in terms of her (presumed) inability to break the underlying finite PRF. This is backed by attacks showing the analysis is tight. Our proofs exploit linear algebraic techniques.",
author = "Mihir Bellare and Roch Gu{\'e}rin and Phillip Rogaway",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 1995.; 15th Annual International Cryptology Conference, CRYPTO 19995 ; Conference date: 27-08-1995 Through 31-08-1995",
year = "1995",
doi = "10.1007/3-540-44750-4\_2",
language = "English",
isbn = "3540602216",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "15--28",
editor = "Don Coppersmith",
booktitle = "Advances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings",
}