Improved multi-user security using the squared-ratio method (Q6145930): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-38545-2_23 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4385654205 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940708 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to stretch random functions: The security of protected counter sums / rank
 
Normal rank
Property / cites work
 
Property / cites work: Luby-Rackoff backwards with more users and more security / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: A modular approach to the security analysis of two-permutation constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Categorization of faulty nonce misuse resistant message authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-user security of the sum of truncated random permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Toward a fully secure authenticated encryption scheme from a pseudorandom permutation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved security analysis for nonce-based enhanced hash-then-mask MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Indistinguishability of the XOR of $$k$$ Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic indistinguishability via the chi-squared method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proof of Mirror Theory for <i>ξ</i> <sub>max</sub> = 2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond birthday bound secure MAC in faulty nonce model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249345 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Multi-user Security of Double Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5750403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight security of cascaded LRW2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight security bounds for double-block hash-then-sum MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374930 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Thwart Birthday Attacks against MACs via Small Randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Proof of Security in O(2 n ) for the Xor of Two Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: The “Coefficients H” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mirror theory and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 12:35, 26 August 2024

scientific article; zbMATH DE number 7799238
Language Label Description Also known as
English
Improved multi-user security using the squared-ratio method
scientific article; zbMATH DE number 7799238

    Statements

    Improved multi-user security using the squared-ratio method (English)
    0 references
    0 references
    0 references
    0 references
    2 February 2024
    0 references
    0 references
    symmetric-key cryptography
    0 references
    provable security
    0 references
    multi-user security
    0 references
    pseudorandom function
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references