On fingerprinting attacks and length-hiding encryption
From MaRDI portal
Publication:2152170
DOI10.1007/978-3-030-95312-6_15zbMATH Open1492.94109OpenAlexW4210310743MaRDI QIDQ2152170FDOQ2152170
Authors: Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_15
Recommendations
Cites Work
- A Provable-Security Treatment of the Key-Wrap Problem
- Characterization of security notions for probabilistic private-key encryption
- Security of symmetric encryption in the presence of ciphertext fragmentation
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Tag size does matter: attacks and proofs for the TLS record protocol
- On Hiding a Plaintext Length by Preencryption
- Title not available (Why is that?)
Cited In (4)
This page was built for publication: On fingerprinting attacks and length-hiding encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152170)