Publication:2778864
From MaRDI portal
zbMath0981.94036MaRDI QIDQ2778864
Publication date: 21 March 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450529
94A62: Authentication, digital signatures and secret sharing
Related Items
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, Cryptanalysis of MORUS, Conditional Reactive Simulatability, Offset-based BBB-secure tweakable block-ciphers with updatable caches, Automated proofs of block cipher modes of operation, On modes of operations of a block cipher for authentication and authenticated encryption, Tweakable block ciphers, Encryption modes with almost free message integrity, Authenticated encryption: relations among notions and analysis of the generic composition paradigm, On the optimality of non-linear computations for symmetric key primitives, The design and evolution of OCB, Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector, Practical key recovery attacks on FlexAEAD, Cryptanalysis of the Authenticated Encryption Algorithm COFFE, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, ASC-1: An Authenticated Encryption Stream Cipher, Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes, Full Disk Encryption: Bridging Theory and Practice, Concealment and Its Applications to Authenticated Encryption, The Software Performance of Authenticated-Encryption Modes, Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks, Robust Authenticated Encryption and the Limits of Symmetric Cryptography, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Authenticated Encryption Mode for Beyond the Birthday Bound Security, A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier, A Provable-Security Treatment of the Key-Wrap Problem