Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_1 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1137145129 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology / rank
 
Normal rank
Property / cites work
 
Property / cites work: HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal classes of hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved Security Bound for HCTR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: New types of cryptanalytic attacks using related keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Message Authentication Against Related-Key Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940691 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of the Extended Codebook (XCB) Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 23:10, 10 July 2024

scientific article
Language Label Description Also known as
English
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes
scientific article

    Statements

    Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (English)
    0 references
    0 references
    0 references
    0 references
    20 October 2015
    0 references
    universal hash function
    0 references
    tweakable enciphering scheme
    0 references
    weak keys
    0 references
    related-key attack
    0 references
    0 references
    0 references
    0 references

    Identifiers