scientific article
From MaRDI portal
Publication:3046361
zbMath1045.94523MaRDI QIDQ3046361
Eliane Jaulmes, Antoine Joux, F. Valette
Publication date: 12 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650237.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (16)
Automated proofs of block cipher modes of operation ⋮ Revisiting structure graphs: applications to CBC-MAC and EMAC ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Salvaging Weak Security Bounds for Blockcipher-Based Constructions ⋮ Security of message authentication codes in the presence of key-dependent messages ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Quantum algorithm for the multicollision problem ⋮ Multilane HMAC— Security beyond the Birthday Limit ⋮ A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
This page was built for publication: