Practical significance of security bounds for standardized internally re-keyed block cipher modes
From MaRDI portal
Publication:3383060
DOI10.4213/mvk282zbMath1473.94091OpenAlexW2964495408WikidataQ123123326 ScholiaQ123123326MaRDI QIDQ3383060
Evgeny K. Alekseev, L. R. Ahmetzyanova, G. K. Sedov, Stanislav V. Smyshlyaev, E. S. Smyshlyaeva
Publication date: 23 September 2021
Published in: Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] (Search for Journal in Brave)
Full work available at URL: http://mathnet.ru/eng/mvk282
Related Items (2)
Methodology for assessing the security of cryptographic protocols ⋮ IQRA: Incremental Quadratic Re-keying friendly Authentication scheme
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Another look at ``provable security
- Analyzing multi-key security degradation
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- О свойствах блочных алгоритмов шифрования Магма и Кузнечик в режиме CTR с преобразованием ключа методом CryptoPro Key Meshing
- Cryptanalysis vs. Provable Security
- A “proof-reading” of Some Issues in Cryptography
- Progress in Cryptology - INDOCRYPT 2003
- Fast Software Encryption
This page was built for publication: Practical significance of security bounds for standardized internally re-keyed block cipher modes