The Missing Difference problem, and its applications to counter mode encryption
From MaRDI portal
(Redirected from Publication:1648860)
Recommendations
Cites work
- scientific article; zbMATH DE number 1030977 (Why is no real title available?)
- scientific article; zbMATH DE number 1455096 (Why is no real title available?)
- scientific article; zbMATH DE number 819814 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- Cycling attacks on GCM, GHASH and other polynomial MACs and hashes
- Differential cryptanalysis of DES-like cryptosystems
- Fast Software Encryption
- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
- Generic universal forgery attack on iterative hash-based MACs
- Improved generic attacks against hash-based MACs and HAIFA
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- New generic attacks against hash-based MACs
- On the security of two MAC algorithms
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Progress in Cryptology - INDOCRYPT 2004
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- The block cipher \textsc{Square}
- Updates on generic attacks against HMAC and NMAC
This page was built for publication: The Missing Difference problem, and its applications to counter mode encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648860)