Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-78381-9_18 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2794569840 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707452 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash-Function Based PRFs: AMAC and Its Multi-User Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic indistinguishability via the chi-squared method / rank
 
Normal rank
Property / cites work
 
Property / cites work: How many queries are needed to distinguish a truncated random permutation from a random function? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Multi-user Security of Double Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Blockcipher Modes of Operation with Beyond the Birthday Bound Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374930 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analyzing multi-key security degradation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconsidering Generic Composition / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: Space bounds for a game on graphs / rank
 
Normal rank

Latest revision as of 01:52, 16 July 2024

scientific article
Language Label Description Also known as
English
Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
scientific article

    Statements

    Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (English)
    0 references
    0 references
    0 references
    0 references
    9 July 2018
    0 references
    multi-user security
    0 references
    AES-GCM-SIV
    0 references
    authenticated encryption
    0 references
    concrete security
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers