A Message Authenticator Algorithm Suitable for a Mainframe Computer, Advances in Cryptology ? Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (CRYPTO'84), pp.393-400, 1985. ,
DOI : 10.1007/3-540-39568-7_30
The Message Authenticator Algorithm (MAA) and its Implementation, NPL Report DITC, vol.10988, 1988. ,
OPAL: Design and implementation of an algebraic programming language, Proceedings of the International Conference on Programming Languages and System Architectures, pp.228-24410, 1994. ,
DOI : 10.1007/3-540-57840-4_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.51.2589
The Third Rewrite Engines Competition, Proceedings of the 8th International Workshop on Rewriting Logic and Its Applications (WRLA'10), pp.243-26110, 2010. ,
DOI : 10.1007/978-3-642-16310-4_16
The Second Rewrite Engines Competition, Electronic Notes in Theoretical Computer Science, vol.238, issue.3, pp.281-291, 2009. ,
DOI : 10.1016/j.entcs.2009.05.025
Compilation of LOTOS Abstract Data Types, Proceedings of the 2nd International Conference on Formal Description Techniques FORTE'89, pp.147-162, 1989. ,
ADT : un compilateur pour les types abstraits algébriques du langage LOTOS, Actes du Colloque Francophone pour l'Ingénierie des Protocoles (CFIP'93), 1993. ,
Proving Termination of Programs Automatically with AProVE, Proceedings of the 7th International Joint Conference on Automated Reasoning (IJCAR'14), pp.184-191, 2014. ,
DOI : 10.1007/978-3-319-08587-6_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.474.5537
A Formal Interpretation of the MAA Standard in Z, NPL Report DITC, vol.18491, 1991. ,
An Implementation of MAA from a VDM Specification, 1991. ,
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.2838
LOTOS Specification of the MAA Standard, with an Evaluation of LOTOS, NPL Report DITC, vol.19191, 1991. ,
Specification of the MAA standard in VDM, NPL Report DITC, vol.16090, 1990. ,
DOI : 10.1007/3-540-54834-3_31
Specification of the MAA standard in VDM, Formal Software Development ? Proceedings 4th International Symposium of VDM Europe (VDM'91), pp.526-54410, 1991. ,
DOI : 10.1007/3-540-54834-3_31
On the Security of Two MAC Algorithms, Advances in Cryptology ? Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'96), pp.19-3210, 1996. ,
DOI : 10.1007/3-540-68339-9_3
On the security of iterated message authentication codes, IEEE Transactions on Information Theory, vol.45, issue.1, pp.188-19910, 1999. ,
DOI : 10.1109/18.746787
Security analysis of the message authenticator algorithm (MAA), European Transactions on Telecommunications, vol.22, issue.3, pp.455-470, 1997. ,
DOI : 10.1002/ett.4460080504
Key Recovery and Collision Clusters for MAA Available at https, Proceedings of the 1st International Conference on Security in Communication Networks (SCN'96), 1996. ,
Table 2 eqPair (BYT (x00000000, x00000000), buildPair (x0103070F, x1F3F7FFF)) eqPair (BYT (xFFFF00FF, xFFFFFFFF), buildPair (xFEFC07F0, pp.0-08000 ,
Table 2 eqOctet (PAT (x00000000, xFF) eqOctet (PAT (xFFFF00FF, xFFFFFFFF), xFF) eqOctet (PAT (xAB00FFCD, p.6 ,
Table 3 eqBlock (H0 (x00000080), x00000018) eqBlock (Q (x01, x00000004) eqBlock (H5 (x00000080, x01), x00000060) eqBlock (H7 (x00000080), pp.60000-60009 ,