Message Authentication, Revisited

From MaRDI portal
Publication:2894418

DOI10.1007/978-3-642-29011-4_22zbMath1297.94117OpenAlexW2106332032WikidataQ59163690 ScholiaQ59163690MaRDI QIDQ2894418

Eike Kiltz, Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_22




Related Items (23)

Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard ModelStrong Authenticity with Leakage Under Weak and Falsifiable Physical AssumptionsHierarchical Identity-Based Encryption with Tight Multi-challenge SecuritySmoothing out binary linear codes and worst-case sub-exponential hardness for LPNCryptography from Learning Parity with NoiseLeakage-resilient cryptography from minimal assumptionsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsAuthentication in the bounded storage modelSecure Message Authentication Against Related-Key AttackMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsA lower bound on the length of signatures based on group actions and generic isogeniesAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelPrivacy-preserving authenticated key exchange in the standard modelEfficient authentication from hard learning problemsGroup Key Establishment in a Quantum-Future ScenarioRobust Encryption, RevisitedTwo-Round Man-in-the-Middle Security from LPNSolving LPN using covering codesAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNUnilaterally-Authenticated Key ExchangeFrom non-adaptive to adaptive pseudorandom functions




This page was built for publication: Message Authentication, Revisited