Publication:3374930
From MaRDI portal
zbMath1082.94526MaRDI QIDQ3374930
Publication date: 1 March 2006
94A60: Cryptography
Related Items
A Generic Method to Design Modes of Operation Beyond the Birthday Bound, A Proof of Security in O(2 n ) for the Xor of Two Random Permutations, Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method, Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds, A note on the chi-square method: a tool for proving cryptographic security, Analysis of the single-permutation encrypted Davies-Meyer construction, Beyond-birthday secure domain-preserving PRFs from a single permutation, On the XOR of Multiple Random Permutations, Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC, Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal, Random number generators based on permutations can pass the collision test, A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier