Pages that link to "Item:Q3593107"
From MaRDI portal
The following pages link to A Provable-Security Treatment of the Key-Wrap Problem (Q3593107):
Displaying 50 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Nonce-misuse security of the SAEF authenticated encryption mode (Q832377) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Simulatable channels: extended security that is universally composable and easier to prove (Q1710688) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- \textsf{FAST}: disk encryption and beyond (Q2070266) (← links)
- Handling adaptive compromise for practical encryption schemes (Q2096475) (← links)
- Indifferentiability for public key cryptosystems (Q2096477) (← links)
- The memory-tightness of authenticated encryption (Q2096479) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle (Q2096604) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- On fingerprinting attacks and length-hiding encryption (Q2152170) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Blockcipher-based authenticated encryption: how small can we go? (Q2188958) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case (Q2835591) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Authenticated Encryption with Variable Stretch (Q2958131) (← links)
- Weak Keys for AEZ, and the External Key Padding Attack (Q2975806) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)
- Security of Hash-then-CBC Key Wrapping Revisited (Q3104712) (← links)
- AEZ: Anything-But EaZy in Hardware (Q3179486) (← links)
- Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode (Q3383061) (← links)
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance (Q3457125) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography (Q3460101) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- Order-Preserving Symmetric Encryption (Q3627437) (← links)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks (Q3627444) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications (Q5056019) (← links)
- Nonce-Based Key Agreement Protocol Against Bad Randomness (Q5205019) (← links)
- $\mathsf{sMGM}$: parameterizable AEAD mode (Q6051895) (← links)