From MAC to Wabisabi
From MAC to Wabisabi * Preamble - big-and-randomized * Wabisabi, from the ground up. * What the Wabisabi paper, and this article, do not cover * Signatures, keyed MACs and credentials * Creating a MAC * Algebraic MACs * Security notions needed for algebraic MACs used for anonymous credentials * Algebraic MAC attempt 1 * Algebraic MAC attempt 2