[1] Bellare M, Canetti R, Krawczyk H. Keying hash funtions for message authentication//Crypto 1996. Heidelberg: Springer-Verlag, 1996: 1-19.[2] Bellare M, Guerin R, Rogaway P. XOR MACs: new methods for message authentication using finite pseudorandom functions//Crypto 1995. Heidelberg: Springer-Verlag, 1995: 15-35.[3] Bellare M, Kiliany J, Rogaway P. The security of the cipher block chaining massage authentication code[J]. Journal of Computer and System Sciences, 2000, 61(3): 362-399.[4] 徐津, 温巧燕, 王大印. 一种新的一阶段加密认证模式[J]. 电子学报, 2009, 37(10): 2187-2192. Xu Jin, Wen Qiaoyan, Wang Dayin. A new one-pass authenticated encryption model[J]. Acta Electronica Sinica, 2009, 37(10): 2187-2192.[5] Black J, Halevi S, Krawczyk H, et al. UMAC: fast and secure message authentication//Crypto 1999. Heidelberg: Springer-Verlag, 1999: 216-245.[6] 王大印, 林东岱, 吴文玲, 等. XOR-MAC消息认证码的安全性新证明[J]. 中国科学院大学学报, 2006, 23(2): 257-262. Wang Dayin, Lin Dongdai, Wu Wenling, et al. A new security analysis for XOR message authentication code[J]. Journal of University of Chinese Academy of Sciences, 2006, 23(2): 257-262.[7] Carter L, Wegman M. Universal hash functions[J]. Journal of Computer and System Sciences, 1979(18): 143-154.[8] Stinson D. Universal hashing and authentication codes[C]//Crypto 1991. Heidelberg: Springer-Verlag, 1991: 74-85.[9] Black J. Message authentication codes\[EB/OL]. [2014-02-26]http://www.cs.colorado.edu/~jrblack/papers/thesis.pdf. |