The following pages link to Message Authentication, Revisited (Q2894418):
Displaying 13 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions (Q2061985) (← links)
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN (Q2129007) (← links)
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions (Q2161418) (← links)
- Authentication in the bounded storage model (Q2170109) (← links)
- Solving LPN using covering codes (Q2303453) (← links)
- From non-adaptive to adaptive pseudorandom functions (Q2344050) (← links)
- Two-Round Man-in-the-Middle Security from LPN (Q2796127) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- Secure Message Authentication Against Related-Key Attack (Q2946884) (← links)