Pages that link to "Item:Q3600218"
From MaRDI portal
The following pages link to Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms (Q3600218):
Displaying 17 items.
- On weak keys and forgery attacks against polynomial-based MAC schemes (Q901368) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- The Missing Difference problem, and its applications to counter mode encryption (Q1648860) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Partition oracles from weak key forgeries (Q2149813) (← links)
- Cryptanalysis of the AEAD and hash algorithm DryGASCON (Q2673773) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 (Q2889874) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Impossible Differential Properties of Reduced Round Streebog (Q2947090) (← links)
- Weak Keys for AEZ, and the External Key Padding Attack (Q2975806) (← links)
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586) (← links)
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes (Q4640336) (← links)
- Об одном семействе универсальных функций хеширования (Q5152401) (← links)
- Криптосистема блочного гаммирования с аутентификацией (Q5871639) (← links)
- Forgery attacks on several beyond-birthday-bound secure MACs (Q6595812) (← links)