Pages that link to "Item:Q1703940"
From MaRDI portal
The following pages link to Analyzing multi-key security degradation (Q1703940):
Displayed 11 items.
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Practical significance of security bounds for standardized internally re-keyed block cipher modes (Q3383060) (← links)
- Block cipher invariants as eigenvectors of correlation matrices (Q5918867) (← links)
- When messages are keys: is HMAC a dual-PRF? (Q6145965) (← links)