Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Extension: Exact Bounds and Multi-user Security 2016-11-30 Paper Hash-Function Based PRFs: AMAC and Its Multi-User Security 2016-09-09 Paper Provably Robust...
    10 bytes (13 words) - 17:20, 6 October 2023
  • Publication Type The multi-user security of MACs via universal hashing in the ideal cipher model 2024-11-12 Paper The exact multi-user security of 2-key triple DES...
    10 bytes (13 words) - 11:22, 28 January 2024
  • chi-squared method 2017-10-27 Paper The Multi-user Security of Double Encryption 2017-06-13 Paper Selective-Opening Security in the Presence of Randomness Failures...
    10 bytes (15 words) - 09:24, 7 October 2023
  • Date of Publication Type Information-theoretic security with asymmetries 2024-12-13 Paper Multi-user security of the Elephant v2 authenticated encryption...
    10 bytes (14 words) - 12:47, 24 September 2023
  • Almost tight multi-user security under adaptive corruptions from LWE in the standard model 2024-02-06 Paper Almost tight multi-user security under adaptive...
    10 bytes (13 words) - 18:34, 24 September 2023
  • of Publication Type The exact multi-user security of 2-key triple DES 2024-11-12 Paper The exact multi-user security of (tweakable) key alternating ciphers...
    10 bytes (13 words) - 11:22, 28 January 2024
  • Almost tight multi-user security under adaptive corruptions from LWE in the standard model 2024-02-06 Paper Almost tight multi-user security under adaptive...
    10 bytes (13 words) - 09:24, 6 October 2023
  • online authenticated encryption scheme achieving full security 2024-10-14 Paper Improved multi-user security using the squared-ratio method 2024-02-02 Paper...
    10 bytes (13 words) - 23:12, 24 September 2023
  • Almost tight multi-user security under adaptive corruptions from LWE in the standard model 2024-02-06 Paper Almost tight multi-user security under adaptive...
    10 bytes (13 words) - 21:04, 11 December 2023
  • The committing security of MACs with applications to generic composition 2024-12-13 Paper A sponge-based PRF with good multi-user security 2024-10-16 Paper...
    10 bytes (13 words) - 12:47, 24 September 2023
  • Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model 2018-10-26 Paper Provable security of (tweakable) block ciphers...
    10 bytes (13 words) - 08:14, 24 September 2023
  • optimal leakage rates from lattices 2024-05-27 Paper Almost tight multi-user security under adaptive corruptions from LWE in the standard model 2024-02-06...
    10 bytes (13 words) - 00:16, 7 October 2023
  • 2023-08-10 Paper Unbounded HIBE with tight security 2023-03-21 Paper Signatures with Tight Multi-user Security from Search Assumptions 2022-12-22 Paper Hierarchical...
    10 bytes (14 words) - 18:28, 11 December 2023
  • efficient digital signatures with tight multi-user security 2021-12-21 Paper Tight leakage-resilient CCA-security from quasi-adaptive hash proof system 2020-03-09...
    10 bytes (13 words) - 18:34, 24 September 2023
  • digital signatures with tight multi-user security 2021-12-21 Paper Session resumption protocols and efficient forward security for TLS 1.3 0-RTT 2021-07-30 Paper...
    10 bytes (13 words) - 23:14, 24 September 2023
  • lattices 2024-11-12 Paper On the multi-user security of LWE-based NIKE 2024-08-15 Paper Towards tight adaptive security of non-interactive key exchange 2023-04-13...
    10 bytes (13 words) - 02:16, 25 September 2023
  • Date of Publication Type Multi-user security of the Elephant v2 authenticated encryption mode 2024-10-14 Paper Generic security of the SAFE API and its applications...
    10 bytes (13 words) - 06:09, 7 October 2023
  • Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) 2023-10-04 Paper Signatures with Tight Multi-user Security...
    10 bytes (13 words) - 11:50, 6 October 2023
  • with Memory-Tight Security in the Multi-challenge Setting 2023-05-26 Paper More efficient digital signatures with tight multi-user security 2021-12-21 Paper...
    10 bytes (13 words) - 22:26, 24 September 2023
  • Date of Publication Type Security analysis of the ISO standard \textsf{OFB}-\textsf{DRBG} 2024-11-04 Paper Multi-user security of the sum of truncated random...
    10 bytes (13 words) - 09:18, 7 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)