New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
From MaRDI portal
Publication:3618662
DOI10.1007/11799313_20zbMath1234.94049OpenAlexW2166669874MaRDI QIDQ3618662
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_20
Related Items (19)
Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ The Missing Difference problem, and its applications to counter mode encryption ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Luby-Rackoff backwards with more users and more security ⋮ The Relation Between CENC and NEMO ⋮ Offset-based BBB-secure tweakable block-ciphers with updatable caches ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ The design and evolution of OCB ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ A note on the chi-square method: a tool for proving cryptographic security ⋮ Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication ⋮ A Generic Method to Design Modes of Operation Beyond the Birthday Bound ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ The summation-truncation hybrid: reusing discarded bits for free
This page was built for publication: New Blockcipher Modes of Operation with Beyond the Birthday Bound Security