Pages that link to "Item:Q3452335"
From MaRDI portal
The following pages link to Keying Hash Functions for Message Authentication (Q3452335):
Displayed 50 items.
- Arbitrated unconditionally secure authentication scheme with multi-senders (Q293236) (← links)
- CBCR: CBC MAC with rotating transformations (Q350985) (← links)
- Efficient arbitrated quantum signature and its proof of security (Q356871) (← links)
- On optimal cryptographic key derivation (Q388109) (← links)
- A simple variant of the Merkle-Damgård scheme with a permutation (Q431787) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- Sequential aggregate signatures with lazy verification from trapdoor permutations (Q476200) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- A symmetric cryptographic scheme for data integrity verification in cloud databases (Q781030) (← links)
- Unintended features of APIs: cryptanalysis of incremental HMAC (Q832351) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Improved generic attacks against hash-based MACs and HAIFA (Q1688402) (← links)
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test (Q1696144) (← links)
- Robust encryption (Q1753165) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- Efficient dissection of bicomposite problems with cryptanalytic applications (Q2010595) (← links)
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC (Q2043323) (← links)
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments (Q2044755) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- Analysing the HPKE standard (Q2056674) (← links)
- Group signatures with user-controlled and sequential linkability (Q2061926) (← links)
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions (Q2061985) (← links)
- New records of pre-image search of reduced SHA-1 using SAT solvers (Q2079908) (← links)
- Handling adaptive compromise for practical encryption schemes (Q2096475) (← links)
- KEMTLS with delayed forward identity protection in (almost) a single round trip (Q2096614) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function (Q2104455) (← links)
- Key-homomorphic pseudorandom functions from LWE with small modulus (Q2119025) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- Provable security analysis of FIDO2 (Q2128991) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Clairvoyant state machine replication (Q2139098) (← links)
- Partition oracles from weak key forgeries (Q2149813) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- CCA secure \textit{a posteriori} openable encryption in the standard model (Q2152171) (← links)
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions (Q2161418) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication (Q2630799) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Public-key generation with verifiable randomness (Q2692338) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption (Q2790052) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions (Q2866733) (← links)
- Another Look at Tightness (Q2889878) (← links)