The following pages link to Another Look at Tightness (Q2889878):
Displaying 10 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Security of BLS and BGLS signatures in a multi-user setting (Q680920) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Leighton-Micali hash-based signatures in the quantum random-oracle model (Q1746971) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Multi-key Security: The Even-Mansour Construction Revisited (Q3457111) (← links)
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms (Q5041159) (← links)