Indifferentiable authenticated encryption
From MaRDI portal
Recommendations
Cited in
(22)- A modular approach to the incompressibility of block-cipher-based AEADs
- Jammin' on the deck
- The indifferentiability of the duplex and its practical applications
- Reconsidering generic composition: the tag-then-encrypt case
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- ParaDiSE: efficient threshold authenticated encryption in fully malicious model
- The relationship between idealized models under computationally bounded adversaries
- Near birthday attack on ``8 bits AEAD mode
- Sequential indifferentiability of confusion-diffusion networks
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Authenticated encryption with key identification
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- Succinctly-committing authenticated encryption
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- Reconsidering generic composition
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
- Handling adaptive compromise for practical encryption schemes
- Indifferentiability for public key cryptosystems
- Quantifying the security cost of migrating protocols to practice
- On the sequential indifferentiability of the Lai-Massey construction
- KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more
This page was built for publication: Indifferentiable authenticated encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673391)