Quantifying the security cost of migrating protocols to practice
From MaRDI portal
Publication:2096478
DOI10.1007/978-3-030-56784-2_4zbMath1503.94043OpenAlexW3030036765MaRDI QIDQ2096478
Thomas Shrimpton, Christopher Patton
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_4
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Efficient signature generation by smart cards
- Kangaroos, monopoly and discrete logarithms
- Forward secrecy of SPAKE2
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Indifferentiable authenticated encryption
- The first collision for full SHA-1
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- Multi-instance Security and Its Application to Password-Based Cryptography
- Careful with Composition: Limitations of the Indifferentiability Framework
- Random Oracles with(out) Programmability
- Stronger Security of Authenticated Key Exchange
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Universally Composable Security with Global Setup
- Message-Locked Encryption and Secure Deduplication
- Universally Composable Password-Based Key Exchange
- Merkle-Damgård Revisited: How to Construct a Hash Function
- The Twin Diffie-Hellman Problem and Applications
- Topics in Cryptology – CT-RSA 2005
- Theory of Cryptography
This page was built for publication: Quantifying the security cost of migrating protocols to practice