Publication:2778864

From MaRDI portal


zbMath0981.94036MaRDI QIDQ2778864

Charanjit S. Jutla

Publication date: 21 March 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450529


94A62: Authentication, digital signatures and secret sharing


Related Items

Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, Cryptanalysis of MORUS, Conditional Reactive Simulatability, Offset-based BBB-secure tweakable block-ciphers with updatable caches, Automated proofs of block cipher modes of operation, On modes of operations of a block cipher for authentication and authenticated encryption, Tweakable block ciphers, Encryption modes with almost free message integrity, Authenticated encryption: relations among notions and analysis of the generic composition paradigm, On the optimality of non-linear computations for symmetric key primitives, The design and evolution of OCB, Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector, Practical key recovery attacks on FlexAEAD, Cryptanalysis of the Authenticated Encryption Algorithm COFFE, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, ASC-1: An Authenticated Encryption Stream Cipher, Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes, Full Disk Encryption: Bridging Theory and Practice, Concealment and Its Applications to Authenticated Encryption, The Software Performance of Authenticated-Encryption Modes, Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks, Robust Authenticated Encryption and the Limits of Symmetric Cryptography, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Authenticated Encryption Mode for Beyond the Birthday Bound Security, A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier, A Provable-Security Treatment of the Key-Wrap Problem