The following pages link to (Q2707428):
Displaying 37 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- Security proof of the canonical form of self-synchronizing stream ciphers (Q510485) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Threshold ECDSA with an offline recovery party (Q2053769) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Cryptanalysis of the AEAD and hash algorithm DryGASCON (Q2673773) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- A New Pseudorandom Generator from Collision-Resistant Hash Functions (Q2890004) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Authenticated Encryption with Variable Stretch (Q2958131) (← links)
- Full Disk Encryption: Bridging Theory and Practice (Q2975807) (← links)
- Concealment and Its Applications to Authenticated Encryption (Q3000035) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography (Q3460101) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- Cryptography in Theory and Practice: The Case of Encryption in IPsec (Q3593086) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- OAEP Is Secure under Key-Dependent Messages (Q3600394) (← links)
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security (Q3634492) (← links)
- Parameterized property testing of functions (Q4638061) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- (Q5150468) (← links)
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol (Q5862307) (← links)
- Conditional Reactive Simulatability (Q5862529) (← links)
- $\mathsf{sMGM}$: parameterizable AEAD mode (Q6051895) (← links)
- Keyed Streebog is a secure PRF and MAC (Q6051899) (← links)
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup (Q6095326) (← links)
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure (Q6535483) (← links)
- Populating the zoo of rugged pseudorandom permutations (Q6562588) (← links)
- Succinctly-committing authenticated encryption (Q6652924) (← links)