{"type":"conference","extern":1,"volume":3621,"date_updated":"2021-01-12T07:41:50Z","publist_id":"3469","intvolume":" 3621","alternative_title":["LNCS"],"title":"Improved security analyses for CBC MACs","quality_controlled":0,"author":[{"first_name":"Mihir","full_name":"Bellare, Mihir","last_name":"Bellare"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","full_name":"Krzysztof Pietrzak"},{"last_name":"Rogaway","full_name":"Rogaway, Phillip","first_name":"Phillip"}],"doi":"10.1007/11535218_32","conference":{"name":"CRYPTO: International Cryptology Conference"},"_id":"3211","abstract":[{"text":"We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bits. The result assumes that no message queried is a prefix of any other, as is the case when all messages to be MACed have the same length. We go on to give an improved analysis of the encrypted CBC MAC, where there is no restriction on queried messages. Letting m be the block length of the longest query, our bounds are about mq2/2n for the basic CBC MAC and mo(1)q2/2n for the encrypted CBC MAC, improving prior bounds of m2q2/2n. The new bounds translate into improved guarantees on the probability of forging these MACs.","lang":"eng"}],"publication_status":"published","acknowledgement":"Pietrzak was supported by the Swiss National Science Foundation, project No. 200020-103847/1.","date_created":"2018-12-11T12:02:02Z","month":"09","citation":{"short":"M. Bellare, K.Z. Pietrzak, P. Rogaway, in:, Springer, 2005, pp. 527–545.","ama":"Bellare M, Pietrzak KZ, Rogaway P. Improved security analyses for CBC MACs. In: Vol 3621. Springer; 2005:527-545. doi:10.1007/11535218_32","mla":"Bellare, Mihir, et al. Improved Security Analyses for CBC MACs. Vol. 3621, Springer, 2005, pp. 527–45, doi:10.1007/11535218_32.","ieee":"M. Bellare, K. Z. Pietrzak, and P. Rogaway, “Improved security analyses for CBC MACs,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 527–545.","chicago":"Bellare, Mihir, Krzysztof Z Pietrzak, and Phillip Rogaway. “Improved Security Analyses for CBC MACs,” 3621:527–45. Springer, 2005. https://doi.org/10.1007/11535218_32.","ista":"Bellare M, Pietrzak KZ, Rogaway P. 2005. Improved security analyses for CBC MACs. CRYPTO: International Cryptology Conference, LNCS, vol. 3621, 527–545.","apa":"Bellare, M., Pietrzak, K. Z., & Rogaway, P. (2005). Improved security analyses for CBC MACs (Vol. 3621, pp. 527–545). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_32"},"day":"12","page":"527 - 545","publisher":"Springer","status":"public","year":"2005","date_published":"2005-09-12T00:00:00Z"}