scientific article; zbMATH DE number 1583788
From MaRDI portal
Publication:2707428
zbMATH Open0974.94008MaRDI QIDQ2707428FDOQ2707428
Authors: M. Bellare, Phillip Rogaway
Publication date: 3 April 2001
Title of this publication is not available (Why is that?)
Recommendations
Cited In (46)
- Authenticated encryption for very short inputs
- Locally decodable and updatable non-malleable codes and their applications
- An efficient IBE scheme with tight security reduction in the random oracle model
- Populating the zoo of rugged pseudorandom permutations
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- A Provable-Security Treatment of the Key-Wrap Problem
- OAEP Is Secure under Key-Dependent Messages
- A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Full disk encryption: bridging theory and practice
- Robust authenticated encryption and the limits of symmetric cryptography
- Authenticated Encryption Mode for Beyond the Birthday Bound Security
- Simpira v2: a family of efficient permutations using the AES round function
- Authenticated encryption with variable stretch
- Provably-secure time-bound hierarchical key assignment schemes
- Title not available (Why is that?)
- Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices
- On-line ciphers and the Hash-CBC constructions
- $\mathsf{sMGM}$: parameterizable AEAD mode
- Keyed Streebog is a secure PRF and MAC
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- How to Enrich the Message Space of a Cipher
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Fast Software Encryption
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Threshold ECDSA with an offline recovery party
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
- Parameterized property testing of functions
- Sherlock Holmes zero-knowledge protocols
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Succinctly-committing authenticated encryption
- RIV for robust authenticated encryption
- A new pseudorandom generator from collision-resistant hash functions
- Concealment and its applications to authenticated encryption
- Analysis of the GOST 28147-89 modes of operation that provide confidentiality
- Security proof of the canonical form of self-synchronizing stream ciphers
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- Conditional reactive simulatability
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2707428)