Pages that link to "Item:Q2914249"
From MaRDI portal
The following pages link to Breaking and Repairing GCM Security Proofs (Q2914249):
Displaying 14 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Another look at XCB (Q892505) (← links)
- On weak keys and forgery attacks against polynomial-based MAC schemes (Q901368) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- The memory-tightness of authenticated encryption (Q2096479) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- ON THE SECURITY OF AEAD-CRYPTOSYSTEM OF THE GCM TYPE (Q5150736) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 (Q6151601) (← links)