Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
From MaRDI portal
Publication:2803661
Recommendations
Cites work
- scientific article; zbMATH DE number 176554 (Why is no real title available?)
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- scientific article; zbMATH DE number 1951616 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 1394311 (Why is no real title available?)
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A white-box DES implementation for DRM applications
- Composition Implies Adaptive Security in Minicrypt
- Critique of the related-key attack concept
- Fast Software Encryption
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- New directions in cryptography
- New types of cryptanalytic attacks using related keys
- Nonmalleable Cryptography
- Obfuscation for Cryptographic Purposes
- On cipher-dependent related-key attacks in the ideal-cipher model
- On related-secret pseudorandomness
- On the (Im)Possibility of Key Dependent Encryption
- Probability Inequalities for Sums of Bounded Random Variables
- Pseudorandom functions and permutations provably secure against related-key attacks
This page was built for publication: Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803661)