The following pages link to (Q2707451):
Displaying 50 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Security of message authentication codes in the presence of key-dependent messages (Q420612) (← links)
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- Scalable attribute-based group key establishment: from~passive to active and deniable (Q744010) (← links)
- Ciphertext verification security of symmetric encryption schemes (Q848329) (← links)
- Using IND-CVA for constructing secure communication (Q848371) (← links)
- CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks (Q991770) (← links)
- Encryption modes with almost free message integrity (Q1021243) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Exploring crypto dark matter: new simple PRF candidates and their applications (Q1631360) (← links)
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Hold your breath, PRIMATEs are lightweight (Q1698631) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Simulatable channels: extended security that is universally composable and easier to prove (Q1710688) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Identity-based authenticated encryption with identity confidentiality (Q2067611) (← links)
- Handling adaptive compromise for practical encryption schemes (Q2096475) (← links)
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle (Q2096604) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions (Q2106709) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Secure storage -- confidentiality and authentication (Q2172857) (← links)
- Composable and finite computational security of quantum message transmission (Q2175915) (← links)
- Obfuscation for cryptographic purposes (Q2267356) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata (Q2300239) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- A fundamental flaw in the ++AE authenticated encryption mode (Q2413289) (← links)
- Cryptanalysis of the AEAD and hash algorithm DryGASCON (Q2673773) (← links)
- Security reductions for white-box key-storage in mobile payments (Q2692343) (← links)
- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption (Q2790052) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- Cryptanalysis of the Authenticated Encryption Algorithm COFFE (Q2807230) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Combiners for Chosen-Ciphertext Security (Q2817868) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879) (← links)
- ASC-1: An Authenticated Encryption Stream Cipher (Q2889882) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Selective Opening Security from Simulatable Data Encapsulation (Q2953779) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)