Pages that link to "Item:Q2889879"
From MaRDI portal
The following pages link to Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879):
Displaying 47 items.
- Practical forgeries for ORANGE (Q783690) (← links)
- Algebraic key-recovery attacks on reduced-round Xoofff (Q832336) (← links)
- Open problems in hash function security (Q887443) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes (Q1726666) (← links)
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje (Q1726679) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Cryptanalysis of \texttt{NORX} v2.0 (Q2010594) (← links)
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC (Q2032168) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Security analysis of subterranean 2.0 (Q2043414) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} (Q2051403) (← links)
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 (Q2055608) (← links)
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection (Q2055626) (← links)
- Compactness of hashing modes and efficiency beyond Merkle tree (Q2056724) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Automatic verification of differential characteristics: application to reduced Gimli (Q2102064) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT (Q2151298) (← links)
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode (Q2229266) (← links)
- An observation on NORX, BLAKE2, and ChaCha (Q2274480) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Cryptanalysis of the AEAD and hash algorithm DryGASCON (Q2673773) (← links)
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions (Q2692336) (← links)
- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption (Q2790052) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- Forgery Attacks on Round-Reduced ICEPOLE-128 (Q2807228) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879) (← links)
- ASC-1: An Authenticated Encryption Stream Cipher (Q2889882) (← links)
- Analysis of NORX: Investigating Differential and Rotational Properties (Q2946482) (← links)
- Cryptographic Applications of the Duplex Construction (Q2960382) (← links)
- Weak Keys for AEZ, and the External Key Padding Attack (Q2975806) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance (Q3457125) (← links)
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length (Q4639468) (← links)
- Cryptanalysis of Reduced NORX (Q4639498) (← links)
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications (Q5056019) (← links)
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 (Q5152391) (← links)
- BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers (Q6146590) (← links)