Bellare M, Canetti R, Krawczyk H. Keying hash funtions for message authentication//Crypto 1996. Heidelberg: Springer-Verlag, 1996: 1-19.
[2]
Bellare M, Guerin R, Rogaway P. XOR MACs: new methods for message authentication using finite pseudorandom functions//Crypto 1995. Heidelberg: Springer-Verlag, 1995: 15-35.
[3]
Bellare M, Kiliany J, Rogaway P. The security of the cipher block chaining massage authentication code[J]. Journal of Computer and System Sciences, 2000, 61(3): 362-399.
[4]
徐津, 温巧燕, 王大印. 一种新的一阶段加密认证模式[J]. 电子学报, 2009, 37(10): 2187-2192. Xu Jin, Wen Qiaoyan, Wang Dayin. A new one-pass authenticated encryption model[J]. Acta Electronica Sinica, 2009, 37(10): 2187-2192.
[5]
Black J, Halevi S, Krawczyk H, et al. UMAC: fast and secure message authentication//Crypto 1999. Heidelberg: Springer-Verlag, 1999: 216-245.
[6]
王大印, 林东岱, 吴文玲, 等. XOR-MAC消息认证码的安全性新证明[J]. 中国科学院大学学报, 2006, 23(2): 257-262. Wang Dayin, Lin Dongdai, Wu Wenling, et al. A new security analysis for XOR message authentication code[J]. Journal of University of Chinese Academy of Sciences, 2006, 23(2): 257-262.
[7]
Carter L, Wegman M. Universal hash functions[J]. Journal of Computer and System Sciences, 1979(18): 143-154.
[8]
Stinson D. Universal hashing and authentication codes[C]//Crypto 1991. Heidelberg: Springer-Verlag, 1991: 74-85.
[9]
Black J. Message authentication codes\[EB/OL]. [2014-02-26]