|
|
(6 intermediate revisions by 4 users not shown) |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: MMH / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: ELmE / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Poly1305-AES / rank |
| | Normal rank |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/s10623-017-0347-3 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2594725628 / rank |
| | Normal rank |
| Property / Wikidata QID |
| | |
| Property / Wikidata QID: Q59606821 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Indifferentiability of Key-Alternating Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Parallelizable and Authenticated Online Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3374913 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hash-Function Based PRFs: AMAC and Its Multi-User Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4341758 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key agreement protocols and their security analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4434895 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Time-Memory Trade-Offs with Multiple Data / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4341751 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17--18, 2006. Revised selected papers. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweaking Even-Mansour Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Another Look at Tightness / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A General Construction of Tweakable Block Ciphers and Different Modes of Operations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Limitations of the Even-Mansour construction / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Software Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: ELmE: A Misuse Resistant Parallel Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Wide Trail Design Strategy / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2760977 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4314029 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A construction of a cipher from a single pseudorandom permutation. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Related-Key Security of Iterated Even–Mansour Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part II / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Tweaking Luby-Rackoff Blockciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part II / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: MMH: Software message authentication in the Gbit/second rates / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Applications of Time Memory Data Tradeoffs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 -- December 3, 2015. Proceedings. Part II / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Software Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic Extraction and Key Derivation: The HKDF Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Message Authentication on 64-Bit Architectures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4409107 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Construct an Ideal Cipher from a Small Set of Public Permutations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweakable Blockciphers with Asymptotically Optimal Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweakable Blockciphers with Beyond Birthday-Bound Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Software Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Optimally Secure Tweakable Blockciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweakable Pseudorandom Permutation from Generalized Feistel Structure / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweak-Length Extension for Tweakable Blockciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Security Analysis of XEX and LRW Modes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Beyond-Birthday-Bound Security Based on Tweakable Block Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of signature schemes in a multi-user setting / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Universal Classes of Extremely Random Constant-Time Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part II / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology - CRYPTO '93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4341731 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New hash functions and their use in authentication and set equality / rank |
| | Normal rank |