Robust authenticated encryption and the limits of symmetric cryptography
From MaRDI portal
Publication:3460101
Recommendations
Cites work
- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1722692 (Why is no real title available?)
- scientific article; zbMATH DE number 1759277 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Augmented secure channels and the goal of the TLS 1.3 record layer
- Confidentiality and integrity: a constructive perspective
- Constructive cryptography -- a new paradigm for security definitions and proofs
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- Fast Software Encryption
- Robust authenticated-encryption AEZ and the problem that it solves
Cited in
(10)- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- Robust authenticated-encryption AEZ and the problem that it solves
- Authenticated encryption with variable stretch
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Robust Encryption
- RIV for robust authenticated encryption
- Robust and secure implementation: equivalence theorems
This page was built for publication: Robust authenticated encryption and the limits of symmetric cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3460101)