The Multi-user Security of Double Encryption (Q5738981): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-56614-6_13 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2603513604 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249346 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash-Function Based PRFs: AMAC and Its Multi-User Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Format-Preserving Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to stretch random functions: The security of protected counter sums / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Multiple Encryption in the Ideal Cipher Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cascade Encryption Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4247202 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank
 
Normal rank

Latest revision as of 22:45, 13 July 2024

scientific article; zbMATH DE number 6729789
Language Label Description Also known as
English
The Multi-user Security of Double Encryption
scientific article; zbMATH DE number 6729789

    Statements

    The Multi-user Security of Double Encryption (English)
    0 references
    0 references
    0 references
    13 June 2017
    0 references
    symmetric security
    0 references
    provable security
    0 references
    multi-user security
    0 references
    double encryption
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers