Post-quantum security models for authenticated encryption
From MaRDI portal
Publication:2802606
DOI10.1007/978-3-319-29360-8_5zbMATH Open1405.81027OpenAlexW2295026061MaRDI QIDQ2802606FDOQ2802606
Authors: Vladimir Soukharev, David D. Yao, S. Seshadri
Publication date: 26 April 2016
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-29360-8_5
Recommendations
- QCB: efficient quantum-secure authenticated encryption
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Sponge-based authenticated encryption: security against quantum attackers
- Quantum-secure (non-)sequential aggregate message authentication codes
- Secure signatures and chosen ciphertext security in a quantum computing world
Cited In (6)
- Quantum key-recovery on full AEZ
- Efficient post-quantum undeniable signature on 64-bit ARM
- Sponge-based authenticated encryption: security against quantum attackers
- QCB is blindly unforgeable
- On the post-quantum security of classical authenticated encryption schemes
- Efficient and reliable post-quantum authentication
This page was built for publication: Post-quantum security models for authenticated encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2802606)