Fast message franking: from invisible salamanders to encryptment
From MaRDI portal
(Redirected from Publication:1673389)
Recommendations
Cited in
(19)- Efficient schemes for committing authenticated encryption
- A message franking channel
- The indifferentiability of the duplex and its practical applications
- Asymmetric message franking: content moderation for metadata-private end-to-end encryption
- The effect of false positives: Why fuzzy message detection leads to fuzzy privacy guarantees?
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Partition oracles from weak key forgeries
- Anonymous, robust post-quantum public key encryption
- Authenticated encryption with key identification
- Compactly committing authenticated encryption using encryptment and tweakable block cipher
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- Asymmetric group message franking: definitions and constructions
- End-to-end secure messaging with traceability only for illegal content
- Integrating causality in messaging channels
- On committing authenticated-encryption
- Forward secure message franking
- The committing security of MACs with applications to generic composition
- KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more
This page was built for publication: Fast message franking: from invisible salamanders to encryptment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673389)