scispace - formally typeset
J

John Black

Researcher at University of Colorado Boulder

Publications -  45
Citations -  4388

John Black is an academic researcher from University of Colorado Boulder. The author has contributed to research in topics: Hash function & Block cipher. The author has an hindex of 25, co-authored 45 publications receiving 4200 citations. Previous affiliations of John Black include Louisiana State University in Shreveport & University of Nevada, Reno.

Papers
More filters
Proceedings ArticleDOI

OCB: a block-cipher mode of operation for efficient authenticated encryption

TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
Book ChapterDOI

UMAC: Fast and Secure Message Authentication

TL;DR: A message authentication algorithm, UMAC, which can authenticate messages roughly an order of magnitude faster than current practice (e.g., HMAC-SHA1), and about twice as fast as times previously reported for the universal hash-function family MMH.
Book ChapterDOI

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV

TL;DR: In this paper, a formal and quantitative treatment of the 64 most basic hash function constructions considered by Preneel, Govaerts, and Vandewalle is provided.
Journal Article

UMAC : Fast and secure message authentication

TL;DR: In this paper, the authors describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current practice (e.g., HMAC-SHA1), and about twice as fast as times previously reported for the universal hash function family MMH.
Journal ArticleDOI

OCB: A block-cipher mode of operation for efficient authenticated encryption

TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.