The following pages link to Reconsidering Generic Composition (Q5418700):
Displayed 24 items.
- A symmetric cryptographic scheme for data integrity verification in cloud databases (Q781030) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- Hiding in plain sight: memory-tight proofs via randomness programming (Q2170068) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Secure storage -- confidentiality and authentication (Q2172857) (← links)
- ACE in chains: how risky is CBC encryption of binary executable files? (Q2229272) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Authenticated Encryption with Variable Stretch (Q2958131) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more (Q6083136) (← links)
- Secret can be public: low-memory AEAD mode for high-order masking (Q6108985) (← links)
- On committing authenticated-encryption (Q6109438) (← links)
- A modular approach to the incompressibility of block-cipher-based AEADs (Q6132427) (← links)
- On the related-key attack security of authenticated encryption schemes (Q6134826) (← links)
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher (Q6157576) (← links)
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels (Q6166952) (← links)
- Sponge-based authenticated encryption: security against quantum attackers (Q6166985) (← links)
- Implicit key-stretching security of encryption schemes (Q6176047) (← links)