|
|
| Property / cites work |
| | |
| Property / cites work: APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Parallelizable and Authenticated Online Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: NORX: Parallel and Scalable AEAD / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Authenticated encryption: relations among notions and analysis of the generic composition paradigm / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Software Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Indifferentiability of the Sponge Construction / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Sponge-Based Pseudo-Random Number Generators / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Indifferentiability Security Analysis of chopMD Hash Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweaking Even-Mansour Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Lambert \(w\) function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Full-state keyed duplex with built-in multi-user support / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Ascon / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Provably Robust Sponge-Based PRNGs and KDFs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16--20, 2015. Proceedings. Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4940697 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The PHOTON Family of Lightweight Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Multi-user Security of Double Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3622892 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Breaking and Repairing GCM Security Proofs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3046361 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of MDC-2 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Software Performance of Authenticated-Encryption Modes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Theory of Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Probability and Computing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4856179 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3579593 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4341676 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4247202 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2016. Proceedings. Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Provable-Security Treatment of the Key-Wrap Problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014. Proceedings, Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Incorporate Associated Data in Sponge-Based Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Birthday Paradox for Multi-collisions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings. / rank |
| | Normal rank |