Puncturable key wrapping and its applications (Q6132430): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-22966-4_22 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4320154922 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Session resumption protocols and efficient forward security for TLS 1.3 0-RTT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Session resumption protocols and efficient forward security for TLS 1.3 0-RTT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Puncturable key wrapping and its applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonces are noticed: AEAD revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Negative Results on Differing-Inputs Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraining Pseudorandom Functions Privately / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symmetric Key Exchange with Full Forward Security and Robust Synchronization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Signatures and Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Forward-Secure Symmetric-Key Derivation Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key rotation for authenticated encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security of Constrained PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: 0-RTT Key Exchange with Full Forward Secrecy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Handling adaptive compromise for practical encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: (R)CCA secure updatable encryption with integrity protection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Extraction and Key Derivation: The HKDF Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Updatable encryption with post-compromise security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank

Latest revision as of 15:10, 2 August 2024

scientific article; zbMATH DE number 7728557
Language Label Description Also known as
English
Puncturable key wrapping and its applications
scientific article; zbMATH DE number 7728557

    Statements

    Puncturable key wrapping and its applications (English)
    0 references
    0 references
    0 references
    0 references
    16 August 2023
    0 references
    0 references

    Identifiers