scientific article; zbMATH DE number 1302861
From MaRDI portal
Publication:4249346
zbMATH Open0931.94011MaRDI QIDQ4249346FDOQ4249346
Authors: M. Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan, William Aiello
Publication date: 17 June 1999
Title of this publication is not available (Why is that?)
Recommendations
- Security amplification for the composition of block ciphers: simpler proofs and new results
- Amplification of Chosen-Ciphertext Security
- Security Amplification for Interactive Cryptographic Primitives
- The security of multiple encryption in the ideal cipher model
- Efficient key dependent message security amplification against chosen ciphertext attacks
- Key-dependent message security: generic amplification and completeness
- Key-dependent message security: generic amplification and completeness
- Combiners for chosen-ciphertext security
- Practical dual-receiver encryption. Soundness, complete non-malleability, and applications
- Efficient amplification of the security of weak pseudo-random function generators
Cited In (10)
- The Multi-user Security of Double Encryption
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries
- A polynomial-time universal security amplifier in the class of block ciphers
- Security amplification for the composition of block ciphers: simpler proofs and new results
- Tight time-space lower bounds for finding multiple collision pairs and their applications
- Title not available (Why is that?)
- Security amplification against meet-in-the-middle attacks using whitening
- The security of multiple encryption in the ideal cipher model
- Amplification of Chosen-Ciphertext Security
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249346)