scientific article
From MaRDI portal
Publication:2707428
zbMath0974.94008MaRDI QIDQ2707428
Mihir Bellare, Phillip Rogaway
Publication date: 3 April 2001
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ A New Pseudorandom Generator from Collision-Resistant Hash Functions ⋮ Parameterized property testing of functions ⋮ Robust Authenticated Encryption and the Limits of Symmetric Cryptography ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ On-line ciphers and the Hash-CBC constructions ⋮ Cryptanalysis of the AEAD and hash algorithm DryGASCON ⋮ $\mathsf{sMGM}$: parameterizable AEAD mode ⋮ Keyed Streebog is a secure PRF and MAC ⋮ Authenticated encryption for very short inputs ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Provably unforgeable threshold EdDSA with an offline participant and trustless setup ⋮ Sherlock Holmes zero-knowledge protocols ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Authenticated Encryption with Variable Stretch ⋮ Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels ⋮ Provably-secure time-bound hierarchical key assignment schemes ⋮ Full Disk Encryption: Bridging Theory and Practice ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ RIV for Robust Authenticated Encryption ⋮ Security proof of the canonical form of self-synchronizing stream ciphers ⋮ Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector ⋮ Cryptography in Theory and Practice: The Case of Encryption in IPsec ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ OAEP Is Secure under Key-Dependent Messages ⋮ Threshold ECDSA with an offline recovery party ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Characterizing Padding Rules of MD Hash Functions Preserving Collision Security ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Cryptographic Verification by Typing for a Sample Protocol Implementation ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ Unnamed Item ⋮ A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol ⋮ Conditional Reactive Simulatability
This page was built for publication: