On fingerprinting attacks and length-hiding encryption
From MaRDI portal
Publication:2152170
DOI10.1007/978-3-030-95312-6_15zbMATH Open1492.94109OpenAlexW4210310743MaRDI QIDQ2152170FDOQ2152170
Tibor Jager, Kai Gellert, Tom Neuschulten, Lin Lyu
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_15
Recommendations
Cites Work
- A Provable-Security Treatment of the Key-Wrap Problem
- Characterization of security notions for probabilistic private-key encryption
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
- On Hiding a Plaintext Length by Preencryption
- Title not available (Why is that?)
Cited In (4)
This page was built for publication: On fingerprinting attacks and length-hiding encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152170)