scientific article; zbMATH DE number 2009976
From MaRDI portal
Publication:4434895
Recommendations
Cited in
(84)- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle
- Cryptography secure against related-key attacks and tampering
- Expedient Non-malleability Notions for Hash Functions
- The Chaining Lemma and its application
- Impossibility on tamper-resilient cryptography with uniqueness properties
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Related-key almost universal hash functions: definitions, constructions and applications
- Continuously non-malleable codes against bounded-depth tampering
- A Unified Approach to Related-Key Attacks
- Continuously non-malleable codes in the split-state model
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- Improved domain extender for the ideal cipher
- Salvaging weak security bounds for blockcipher-based constructions
- Efficient completely non-malleable and RKA secure public key encryptions
- QCB: efficient quantum-secure authenticated encryption
- Non-malleable functions and their applications
- Security of NMAC and HMAC Based on Non-malleability
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Subversion-resilient signatures: definitions, constructions and applications
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Robust encryption, revisited
- Security under message-derived keys: signcryption in iMessage
- A Scheme to Base a Hash Function on a Block Cipher
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- Pseudorandom functions and permutations provably secure against related-key attacks
- Related-key analysis of generalized Feistel networks with expanding round functions
- On the related-key attack security of authenticated encryption schemes
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Robust digital signature revisited
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Secure message authentication against related-key attack
- Critique of the related-key attack concept
- Connecting tweakable and multi-key blockcipher security
- Non-malleable Codes with Split-State Refresh
- Provable related-key security of contracting Feistel networks
- Security of hedged Fiat-Shamir signatures under fault attacks
- On related-secret pseudorandomness
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- On cipher-dependent related-key attacks in the ideal-cipher model
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Optimally secure block ciphers from ideal primitives
- Modeling random oracles under unpredictable queries
- Efficient schemes for committing authenticated encryption
- Garbling XOR gates ``for free in the standard model
- A simple variant of the Merkle-Damgård scheme with a permutation
- Bounded tamper resilience: how to go beyond the algebraic barrier
- New proofs for NMAC and HMAC: security without collision resistance
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Public key encryption resilient to leakage and tampering attacks
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Fast Software Encryption
- Tweakable block ciphers
- Reflection ciphers
- Relations between robustness and RKA security under public-key encryption
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Related-key security for pseudorandom functions beyond the linear barrier
- The related-key analysis of Feistel constructions
- Functional encryption: deterministic to randomized functions from simple assumptions
- A note on quantum related-key attacks
- Notions and relations for RKA-secure permutation and function families
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Delayed-key message authentication for streams
- Practical non-malleable codes from symmetric-key primitives in 2-split-state model
- When messages are keys: is HMAC a dual-PRF?
- Multi-instance secure public-key encryption
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Certified Encryption Revisited
- Network coding signature schemes against related-key attacks in the random oracle model
- Practical verifiable random function with RKA security
- Adaptive distributional security for garbling schemes with \(\mathcal{O}(|x|)\) online complexity
- More efficient public-key cryptography with leakage and tamper resilience
- The Security of Elastic Block Ciphers Against Key-Recovery Attacks
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- On the Unprovable Security of 2-Key XCBC
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Provably-secure remote memory attestation for heap overflow protection
- Minimizing the two-round tweakable Even-Mansour cipher
- The indifferentiability of the duplex and its practical applications
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434895)