Short variable length domain extenders with beyond birthday bound security (Q1633453): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer-Aided Security Proofs for the Working Cryptographer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-uniform Cracks in the Concrete: The Power of Free Precomputation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving the TLS Handshake Secure (As It Is) / rank
 
Normal rank
Property / cites work
 
Property / cites work: State separation for code-based game-playing proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A formal security analysis of the Signal messaging protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal / rank
 
Normal rank
Property / cites work
 
Property / cites work: A cryptographic analysis of the TLS 1.3 handshake protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: GNUC: a new universal composability framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of TLS-DHE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4414308 / rank
 
Normal rank
Property / cites work
 
Property / cites work: (De-)Constructing TLS 1.3 / rank
 
Normal rank
Property / cites work
 
Property / cites work: HMQV: A High-Performance Secure Diffie-Hellman Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of the TLS Protocol: A Systematic Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructive Cryptography – A Primer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructive Cryptography – A New Paradigm for Security Definitions and Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An equational approach to secure multi-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A calculus of mobile processes. I / rank
 
Normal rank
Property / cites work
 
Property / cites work: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Long-Term Security and Universal Composability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Careful with Composition: Limitations of the Indifferentiability Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formalizing Human Ignorance / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dependent types and multi-monadic effects in F* / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4473975 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified Universal Composability Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-quantum security of Fiat-Shamir / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Identity-Based Encryption in the Quantum Random Oracle Model / rank
 
Normal rank

Latest revision as of 17:27, 17 July 2024

scientific article
Language Label Description Also known as
English
Short variable length domain extenders with beyond birthday bound security
scientific article

    Statements

    Short variable length domain extenders with beyond birthday bound security (English)
    0 references
    0 references
    0 references
    0 references
    20 December 2018
    0 references
    length doublers
    0 references
    LDT
    0 references
    beyond birthday bound
    0 references
    harmonic primitives
    0 references
    chi-squared
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers