The following pages link to The “Coefficients H” Technique (Q3644210):
Displayed 22 items.
- Secret can be public: low-memory AEAD mode for high-order masking (Q6108985) (← links)
- Block-cipher-based tree hashing (Q6111546) (← links)
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security (Q6132423) (← links)
- Jammin' on the deck (Q6132426) (← links)
- Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} (Q6135403) (← links)
- A modular approach to the security analysis of two-permutation constructions (Q6135404) (← links)
- Improved multi-user security using the squared-ratio method (Q6145930) (← links)
- Better security-efficiency trade-offs in permutation-based two-party computation (Q6157519) (← links)
- Tight security for key-alternating ciphers with correlated sub-keys (Q6157557) (← links)
- Fine-tuning the ISO/IEC standard \textsf{LightMAC} (Q6157560) (← links)
- Categorization of faulty nonce misuse resistant message authentication (Q6157561) (← links)
- Revisiting the security of \textsf{COMET} authenticated encryption scheme (Q6157568) (← links)
- \textsf{tHyENA}: making \textsf{HyENA} even smaller (Q6157569) (← links)
- On the Efficiency of ZMAC-Type Modes (Q6162315) (← links)
- Provable security of HADES structure (Q6164404) (← links)
- Provably secure reflection ciphers (Q6166950) (← links)
- Designing tweakable enciphering schemes using public permutations (Q6167296) (← links)
- INT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU} (Q6169462) (← links)
- Offset-based BBB-secure tweakable block-ciphers with updatable caches (Q6169463) (← links)
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication (Q6169464) (← links)
- Provable security against generic attacks on stream ciphers (Q6175436) (← links)
- Half-tree: halving the cost of tree expansion in COT and DPF (Q6178790) (← links)