Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_26 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2408271648 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pipelineable On-line Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography Secure against Related-Key Attacks and Tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security Bounds for Wegman-Carter-Shoup Authenticators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Message Authentication Against Related-Key Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934727 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941857 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Badger – A Fast and Provably Secure MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal classes of hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaking Even-Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Forgeries for Prøst-OTR / rank
 
Normal rank
Property / cites work
 
Property / cites work: A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941858 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Related-Key Security of Iterated Even–Mansour Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: MMH: Software message authentication in the Gbit/second rates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking and Repairing GCM Security Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778864 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940691 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power of a Public Random Permutation and Its Application to Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409107 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Related-Key Attacks for HMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Fast and Provably Secure Message Authentication Based on Universal Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035708 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4393245 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank
 
Normal rank

Latest revision as of 14:31, 15 July 2024

scientific article; zbMATH DE number 6867450
Language Label Description Also known as
English
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
scientific article; zbMATH DE number 6867450

    Statements

    Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    9 May 2018
    0 references
    almost universal hash function
    0 references
    related-key attack
    0 references
    related-key almost universal hash function
    0 references
    message authentication code
    0 references
    tweakable block cipher
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers