scientific article; zbMATH DE number 1303128
From MaRDI portal
Publication:4249643
zbMATH Open0994.94521MaRDI QIDQ4249643FDOQ4249643
Authors: M. Bellare, Ted Krovetz, Phillip Rogaway
Publication date: 8 October 2002
Title of this publication is not available (Why is that?)
Recommendations
Cited In (32)
- Luby-Rackoff backwards with more users and more security
- Improved multi-user security using the squared-ratio method
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
- Cryptanalysis of Tweaked Versions of SMASH and Reparation
- Salvaging Weak Security Bounds for Blockcipher-Based Constructions
- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
- \textsf{LightMAC}: fork it and make it faster
- Building blockcipher from small-block tweakable blockcipher
- A note on the chi-square method: a tool for proving cryptographic security
- The Relation Between CENC and NEMO
- How to build optimally secure PRFs using block ciphers
- Quantum attacks on PRFs based on public random permutations
- Luby-Rackoff Ciphers from Weak Round Functions?
- Keyed sum of permutations: a simpler RP-based PRF
- Targeted invertible pseudorandom functions and deterministic format-transforming encryption
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- Revisiting the indifferentiability of the sum of permutations
- A sponge-based PRF with good multi-user security
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- Tweak-Length Extension for Tweakable Blockciphers
- Analysis of the single-permutation encrypted Davies-Meyer construction
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Proof of mirror theory for a wide range of \(\xi_{\max }\)
- Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis
- Categorization of faulty nonce misuse resistant message authentication
- Information-theoretic security with asymmetries
- A Generic Method to Design Modes of Operation Beyond the Birthday Bound
- On the XOR of Multiple Random Permutations
- The summation-truncation hybrid: reusing discarded bits for free
- Multi-user security of the sum of truncated random permutations
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249643)