The summation-truncation hybrid: reusing discarded bits for free (Q2096483): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(11 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: PRINCE / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SIMECK / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: KATAN / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: KLEIN / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Piccolo / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SKINNY / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: mCrypton / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LBlock / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SIMON / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3048662861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940708 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to stretch random functions: The security of protected counter sums / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security Bounds for Wegman-Carter-Shoup Authenticators / rank
 
Normal rank
Property / cites work
 
Property / cites work: A note on the chi-square method: a tool for proving cryptographic security / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic indistinguishability via the chi-squared method / rank
 
Normal rank
Property / cites work
 
Property / cites work: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: How many queries are needed to distinguish a truncated random permutation from a random function? / rank
 
Normal rank
Property / cites work
 
Property / cites work: KLEIN: A New Family of Lightweight Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249345 / rank
 
Normal rank
Property / cites work
 
Property / cites work: HIGHT: A New Block Cipher Suitable for Low-Resource Device / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Blockcipher Modes of Operation with Beyond the Birthday Bound Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking and Repairing GCM Security Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20--24, 2017. Proceedings. Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374930 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal forgeries against polynomial-based MACs and GCM / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linking Stam's bounds with generalized truncation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 -- May 3, 2018. Proceedings. Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Piccolo: An Ultra-Lightweight Blockcipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Fast and Provably Secure Message Authentication Based on Universal Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distance between sampling with and without replacement / rank
 
Normal rank
Property / cites work
 
Property / cites work: A NOTE ON SAMPLING WITH AND WITHOUT REPLACEMENT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings. / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: LBlock: A Lightweight Block Cipher / rank
 
Normal rank

Latest revision as of 18:33, 30 July 2024

scientific article
Language Label Description Also known as
English
The summation-truncation hybrid: reusing discarded bits for free
scientific article

    Statements

    The summation-truncation hybrid: reusing discarded bits for free (English)
    0 references
    0 references
    0 references
    9 November 2022
    0 references
    PRP-to-PRF
    0 references
    truncation
    0 references
    sum of permutations
    0 references
    efficiency
    0 references
    GCM-SIV
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers