GCM security bounds reconsidered
From MaRDI portal
Publication:2946953
Recommendations
Cited in
(7)- How fast can SM4 be in software?
- Optimal forgeries against polynomial-based MACs and GCM
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation
- Authentication key recovery on Galois/counter mode (GCM)
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- Breaking and repairing GCM security proofs
This page was built for publication: GCM security bounds reconsidered
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946953)