Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • compromise through identity-binding PAKEs 2023-06-28 Paper A formal security analysis of the Signal messaging protocol 2020-11-06 Paper Highly efficient...
    10 bytes (21 words) - 03:58, 12 December 2023
  • Bandwidth and Computation Without Sacrificing Security 2008-12-21 Paper On the Security of OAEP 2008-04-24 Paper Analysis of Random Oracle Instantiation Scenarios...
    10 bytes (16 words) - 22:21, 11 December 2023
  • Schemes Based on Polynomial Equations over Real Numbers 2022-10-13 Paper Security analysis on an ElGamal-like multivariate encryption scheme based on isomorphism...
    10 bytes (16 words) - 03:02, 7 October 2023
  • Paper Tweakable Blockciphers with Asymptotically Optimal Security 2015-09-18 Paper Security Analysis of Key-Alternating Feistel Ciphers 2015-09-18 Paper The...
    10 bytes (16 words) - 23:41, 24 September 2023
  • Type Improved multi-user security using the squared-ratio method 2024-02-02 Paper A modular approach to the security analysis of two-permutation constructions...
    10 bytes (17 words) - 13:47, 24 September 2023
  • Foundations of Security Analysis and Design II 2009-05-14 Paper Foundations of Security Analysis and Design II 2009-05-14 Paper Information flow security in boundary...
    10 bytes (17 words) - 13:56, 6 October 2023
  • 2016-01-12 Paper Differential Fault Analysis of SHA-3 2016-01-12 Paper On the security of RFID anti-counting security protocol (ACSP) 2015-06-17 Paper Cryptanalysis...
    10 bytes (17 words) - 15:21, 6 October 2023
  • Publication Date of Publication Type Security analysis of the WhatsApp end-to-end encrypted backup protocol 2024-02-06 Paper DualDory: logarithmic-verifier...
    10 bytes (16 words) - 19:28, 24 September 2023
  • Publication Date of Publication Type Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds 2022-04-21 Paper...
    10 bytes (18 words) - 12:32, 14 March 2024
  • Type Practical Security Analysis of PUF-Based Two-Player Protocols 2012-11-13 Paper SIMPL Systems as a Keyless Cryptographic and Security Primitive 2012-06-08...
    10 bytes (16 words) - 05:44, 7 October 2023
  • gap SVP to LWE: a concrete security analysis 2023-07-07 Paper Verifying solutions to LWE with implications for concrete security 2021-05-12 Paper...
    10 bytes (16 words) - 22:51, 24 September 2023
  • Scheme 2014-08-20 Paper Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN 2014-01-14 Paper On the Security of Hash Functions Employing...
    10 bytes (16 words) - 18:50, 24 September 2023
  • Publication Type Salvaging Weak Security Bounds for Blockcipher-Based Constructions 2017-02-01 Paper A Provable-Security Analysis of Intel’s Secure Key RNG 2015-09-30...
    10 bytes (18 words) - 11:01, 7 October 2023
  • Asymptotically Optimal Security 2015-09-18 Paper Security Analysis of Key-Alternating Feistel Ciphers 2015-09-18 Paper Relaxing Full-Codebook Security: A Refined Analysis...
    10 bytes (17 words) - 18:20, 6 October 2023
  • Protocol Analysis and Computational Soundness 2009-03-10 Paper A Modular Security Analysis of the TLS Handshake Protocol 2009-02-10 Paper Security analysis...
    10 bytes (16 words) - 08:53, 6 October 2023
  • A modular analysis 2010-03-01 Paper Security Notions and Generic Constructions for Client Puzzles 2009-12-15 Paper A Modular Security Analysis of the TLS...
    10 bytes (16 words) - 09:03, 25 September 2023
  • Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium 2024-02-06 Paper Machine-checked security for XMSS as in RFC 8391 and...
    10 bytes (16 words) - 09:14, 24 September 2023
  • Date of Publication Type Quantifying the security cost of migrating protocols to practice 2022-11-09 Paper Security in the presence of key reuse: context-separable...
    10 bytes (16 words) - 13:20, 12 December 2023
  • decryption and re-encryption leakage: the case of Kyber 2023-12-12 Paper Security analysis of deterministic re-keying with masking and shuffling: application...
    10 bytes (16 words) - 23:55, 24 September 2023
  • Improved security analysis of PMAC 2008-11-07 Paper An Improved Security Bound for HCTR 2008-09-18 Paper Improved Indifferentiability Security Analysis of chopMD...
    10 bytes (16 words) - 02:01, 7 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)