scientific article; zbMATH DE number 1583788
From MaRDI portal
Publication:2707428
zbMATH Open0974.94008MaRDI QIDQ2707428FDOQ2707428
Publication date: 3 April 2001
Title of this publication is not available (Why is that?)
Recommendations
Cited In (46)
- Authenticated encryption for very short inputs
- Locally decodable and updatable non-malleable codes and their applications
- An efficient IBE scheme with tight security reduction in the random oracle model
- Populating the zoo of rugged pseudorandom permutations
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- A New Pseudorandom Generator from Collision-Resistant Hash Functions
- A Provable-Security Treatment of the Key-Wrap Problem
- OAEP Is Secure under Key-Dependent Messages
- Concealment and Its Applications to Authenticated Encryption
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- Provably-secure time-bound hierarchical key assignment schemes
- Title not available (Why is that?)
- On-line ciphers and the Hash-CBC constructions
- $\mathsf{sMGM}$: parameterizable AEAD mode
- Keyed Streebog is a secure PRF and MAC
- RIV for Robust Authenticated Encryption
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup
- How to Enrich the Message Space of a Cipher
- Title not available (Why is that?)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Full Disk Encryption: Bridging Theory and Practice
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Fast Software Encryption
- Authenticated Encryption with Variable Stretch
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
- Threshold ECDSA with an offline recovery party
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
- Conditional Reactive Simulatability
- Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
- Parameterized property testing of functions
- Sherlock Holmes zero-knowledge protocols
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Succinctly-committing authenticated encryption
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
- Security proof of the canonical form of self-synchronizing stream ciphers
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2707428)