Robust authenticated encryption and the limits of symmetric cryptography
From MaRDI portal
Publication:3460101
DOI10.1007/978-3-319-27239-9_7zbMATH Open1376.94025OpenAlexW2408282941MaRDI QIDQ3460101FDOQ3460101
Authors: Christian Badertscher, Christian Matt, Ueli M. Maurer, Björn Tackmann, Phillip Rogaway
Publication date: 12 January 2016
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-27239-9_7
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- Title not available (Why is that?)
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- A Provable-Security Treatment of the Key-Wrap Problem
- Title not available (Why is that?)
- Robust authenticated-encryption AEZ and the problem that it solves
- Confidentiality and integrity: a constructive perspective
- Constructive cryptography -- a new paradigm for security definitions and proofs
- Augmented secure channels and the goal of the TLS 1.3 record layer
Cited In (10)
- Title not available (Why is that?)
- Robust authenticated-encryption AEZ and the problem that it solves
- Authenticated encryption with variable stretch
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Robust Encryption
- RIV for robust authenticated encryption
- Robust and secure implementation: equivalence theorems
This page was built for publication: Robust authenticated encryption and the limits of symmetric cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3460101)