scientific article

From MaRDI portal
Publication:2707428

zbMath0974.94008MaRDI QIDQ2707428

Mihir Bellare, Phillip Rogaway

Publication date: 3 April 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

An efficient IBE scheme with tight security reduction in the random oracle modelA New Pseudorandom Generator from Collision-Resistant Hash FunctionsParameterized property testing of functionsRobust Authenticated Encryption and the Limits of Symmetric Cryptographysp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesOn-line ciphers and the Hash-CBC constructionsCryptanalysis of the AEAD and hash algorithm DryGASCON$\mathsf{sMGM}$: parameterizable AEAD modeKeyed Streebog is a secure PRF and MACAuthenticated encryption for very short inputsIntegrity Analysis of Authenticated Encryption Based on Stream CiphersContext discovery and commitment attacks. How to break CCM, EAX, SIV, and moreProvably unforgeable threshold EdDSA with an offline participant and trustless setupSherlock Holmes zero-knowledge protocolsAuthenticated Encryption Mode for Beyond the Birthday Bound SecuritySimpira v2: A Family of Efficient Permutations Using the AES Round FunctionAuthenticated Encryption with Variable StretchOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsProvably-secure time-bound hierarchical key assignment schemesFull Disk Encryption: Bridging Theory and PracticeConcealment and Its Applications to Authenticated EncryptionRIV for Robust Authenticated EncryptionSecurity proof of the canonical form of self-synchronizing stream ciphersModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorCryptography in Theory and Practice: The Case of Encryption in IPsecA Provable-Security Treatment of the Key-Wrap ProblemOAEP Is Secure under Key-Dependent MessagesThreshold ECDSA with an offline recovery partyLocally decodable and updatable non-malleable codes and their applicationsEfficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Characterizing Padding Rules of MD Hash Functions Preserving Collision SecurityAuthenticated encryption: relations among notions and analysis of the generic composition paradigmCryptographic Verification by Typing for a Sample Protocol ImplementationCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersUnnamed ItemA Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolConditional Reactive Simulatability




This page was built for publication: