Pages that link to "Item:Q1152713"
From MaRDI portal
The following pages link to New hash functions and their use in authentication and set equality (Q1152713):
Displaying 50 items.
- Attacks on quantum key distribution protocols that employ non-ITS authentication (Q265393) (← links)
- Unconditionally secure quantum signatures (Q296340) (← links)
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- An optimally fair coin toss (Q315542) (← links)
- Study on the security of the authentication scheme with key recycling in QKD (Q331437) (← links)
- Continuous-variable quantum identity authentication based on quantum teleportation (Q332064) (← links)
- d-k-min-wise independent family of hash functions (Q340570) (← links)
- A new multi-linear universal hash family (Q369419) (← links)
- Improving classical authentication over a quantum channel (Q406240) (← links)
- Revisiting iterated attacks in the context of decorrelation theory (Q458736) (← links)
- Certifying algorithms (Q465678) (← links)
- Cache-oblivious hashing (Q472489) (← links)
- Quantum cryptography: public key distribution and coin tossing (Q477162) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- Direct proof of security of Wegman-Carter authentication with partially known key (Q479440) (← links)
- Explicit and efficient hash families suffice for cuckoo hashing with a stash (Q487008) (← links)
- A practical protocol for three-party authenticated quantum key distribution (Q488178) (← links)
- A parallel tree difference algorithm (Q673225) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- Variationally universal hashing (Q845822) (← links)
- Secret sharing schemes with partial broadcast channels (Q851779) (← links)
- Efficient bit sifting scheme of post-processing in quantum key distribution (Q892640) (← links)
- On weak keys and forgery attacks against polynomial-based MAC schemes (Q901368) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- On message authentication with a correlated setup (Q903369) (← links)
- A complexity theory of efficient parallel algorithms (Q913512) (← links)
- Two improved range-efficient algorithms for \(F_0\) estimation (Q1007249) (← links)
- Hierarchical sampling from sketches: Estimating functions over data streams (Q1016526) (← links)
- Quantum identity authentication based on ping-pong technique for photons (Q1017269) (← links)
- An improved scheme for set equality testing and updating (Q1129006) (← links)
- Reliable communication over partially authenticated networks (Q1292432) (← links)
- Combinatorial techniques for universal hashing (Q1329163) (← links)
- Universal hashing and authentication codes (Q1335421) (← links)
- Logarithm Cartesian authentication codes. (Q1398375) (← links)
- Non-cryptographic primitive for pseudorandom permutation. (Q1426446) (← links)
- Randomized OBDD-based graph algorithms (Q1625606) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- On the ring-LWE and polynomial-LWE problems (Q1648786) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Comment on ''A practical protocol for three-party authenticated quantum key distribution'' (Q1679258) (← links)
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test (Q1696144) (← links)
- Evaluating Bernstein-Rabin-Winograd polynomials (Q1727367) (← links)
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (Q1749791) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Qubit authentication (Q1850347) (← links)
- Multireceiver authentication codes: Models, bounds, constructions, and extensions (Q1854288) (← links)
- Symmetric blind information reconciliation and hash-function-based verification for quantum key distribution (Q1992109) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)