On the adaptive security of MACs and PRFs (Q2692364): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_24 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3090823858 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating Short Structure-Preserving Signatures from Non-interactive Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Complexity of Byzantine Agreement, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly-Secure Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Tight Cryptographic Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Notions of Black-Box Reductions, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2754169 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-instance Security and Its Application to Password-Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Hardness of Proving CCA-Security of Signed ElGamal / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking RSA may not be equivalent to factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separation Results on the “One-More” Computational Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Look at Tightness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737250 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035738 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Three-Move Blind Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating succinct non-interactive arguments from all falsifiable assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Waters Signatures with Optimal Security Reduction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key authenticated encryption with corruptions: reductions are lossy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Security Proofs for Full Domain Hash, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4871218 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analyzing multi-key security degradation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security loss of unique signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits of provable security from standard assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimally Secure Block Ciphers from Ideal Primitives / rank
 
Normal rank

Latest revision as of 18:07, 31 July 2024

scientific article
Language Label Description Also known as
English
On the adaptive security of MACs and PRFs
scientific article

    Statements

    On the adaptive security of MACs and PRFs (English)
    0 references
    0 references
    0 references
    0 references
    21 March 2023
    0 references
    message authentication codes
    0 references
    pseudorandom functions
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers