Pages that link to "Item:Q1152713"
From MaRDI portal
The following pages link to New hash functions and their use in authentication and set equality (Q1152713):
Displaying 50 items.
- The circulant hash revisited (Q2033521) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 (Q2055608) (← links)
- Efficient simulation of random states and random unitaries (Q2055680) (← links)
- Revisiting construction of online cipher in hash-ECB-hash structure (Q2057180) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Quantum identity authentication in the orthogonal-state-encoding QKD system (Q2100756) (← links)
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice? (Q2102791) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Quantum key distribution using universal hash functions over finite fields (Q2107057) (← links)
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication (Q2111001) (← links)
- Quantum identity authentication based on round robin differencial phase shift communication line (Q2114015) (← links)
- Authenticated QKD based on orthogonal states (Q2145948) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Entropy accumulation (Q2206013) (← links)
- Low-congestion shortcut and graph parameters (Q2241301) (← links)
- Structure-preserving public-key encryption with leakage-resilient CCA security (Q2330095) (← links)
- Generation of \(k\)-wise independent random variables with small randomness (Q2335724) (← links)
- Scalable mechanisms for rational secret sharing (Q2355325) (← links)
- Counting distinct items over update streams (Q2371800) (← links)
- Instantiability of RSA-OAEP under chosen-plaintext attack (Q2408591) (← links)
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness (Q2413008) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Improved asymmetric cipher based on matrix power function with provable security (Q2415028) (← links)
- Hardness-preserving reductions via cuckoo hashing (Q2423841) (← links)
- A trade-off between collision probability and key size in universal hashing using polynomials (Q2430412) (← links)
- On the existence of quantum signature for quantum messages (Q2436471) (← links)
- Asymmetric ``4+2'' protocol for quantum key distribution with finite resources (Q2443961) (← links)
- Key-leakage evaluation of authentication in quantum key distribution with finite resources (Q2454246) (← links)
- Authenticating ad hoc networks by comparison of short digests (Q2482445) (← links)
- MRD hashing. (Q2572989) (← links)
- Experimental quantum cryptography. (Q2642405) (← links)
- Simple analysis of security of the BB84 quantum key distribution protocol (Q2677238) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- KVaC: key-value commitments for blockchains and beyond (Q2691607) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Sublinear-space approximation algorithms for Max \(r\)-SAT (Q2695279) (← links)
- The smooth entropy formalism for von Neumann algebras (Q2786618) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 (Q2889874) (← links)
- FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION (Q2905285) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters (Q2953805) (← links)
- The Case for Quantum Key Distribution (Q3064339) (← links)
- Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790) (← links)
- A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys (Q3102797) (← links)
- On the state of strength-three covering arrays (Q3150159) (← links)