On fingerprinting attacks and length-hiding encryption
From MaRDI portal
Publication:2152170
Recommendations
Cites work
- scientific article; zbMATH DE number 2090938 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Characterization of security notions for probabilistic private-key encryption
- Multi-key authenticated encryption with corruptions: reductions are lossy
- On Hiding a Plaintext Length by Preencryption
- Security of symmetric encryption in the presence of ciphertext fragmentation
- Tag size does matter: attacks and proofs for the TLS record protocol
Cited in
(4)
This page was built for publication: On fingerprinting attacks and length-hiding encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152170)