scientific article; zbMATH DE number 2009976
From MaRDI portal
Publication:4434895
zbMATH Open1038.94520MaRDI QIDQ4434895FDOQ4434895
Authors: M. Bellare, Tadayoshi Kohno
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560491.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (84)
- Continuously non-malleable codes in the split-state model
- Related-key analysis of generalized Feistel networks with expanding round functions
- On related-secret pseudorandomness
- Continuously non-malleable codes against bounded-depth tampering
- Relations between robustness and RKA security under public-key encryption
- Subversion-resilient signatures: definitions, constructions and applications
- New proofs for NMAC and HMAC: security without collision resistance
- Notions and relations for RKA-secure permutation and function families
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode
- Secure message authentication against related-key attack
- The related-key analysis of Feistel constructions
- Provable related-key security of contracting Feistel networks
- Security of hedged Fiat-Shamir signatures under fault attacks
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Critique of the related-key attack concept
- Related-key almost universal hash functions: definitions, constructions and applications
- Optimally secure block ciphers from ideal primitives
- Cryptography secure against related-key attacks and tampering
- A Unified Approach to Related-Key Attacks
- Robust encryption, revisited
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Tweakable block ciphers
- Connecting tweakable and multi-key blockcipher security
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Garbling XOR gates ``for free in the standard model
- A note on quantum related-key attacks
- A simple variant of the Merkle-Damgård scheme with a permutation
- Security of NMAC and HMAC Based on Non-malleability
- Improved domain extender for the ideal cipher
- Functional encryption: deterministic to randomized functions from simple assumptions
- Related-key security for pseudorandom functions beyond the linear barrier
- Efficient completely non-malleable and RKA secure public key encryptions
- Security under message-derived keys: signcryption in iMessage
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function
- Fast Software Encryption
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Modeling random oracles under unpredictable queries
- On the related-key attack security of authenticated encryption schemes
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Pseudorandom functions and permutations provably secure against related-key attacks
- On cipher-dependent related-key attacks in the ideal-cipher model
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Public key encryption resilient to leakage and tampering attacks
- Expedient Non-malleability Notions for Hash Functions
- The Chaining Lemma and its application
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code
- QCB: efficient quantum-secure authenticated encryption
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Reflection ciphers
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Salvaging weak security bounds for blockcipher-based constructions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Robust digital signature revisited
- Non-malleable Codes with Split-State Refresh
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle
- Non-malleable functions and their applications
- A Scheme to Base a Hash Function on a Block Cipher
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Efficient schemes for committing authenticated encryption
- The indifferentiability of the duplex and its practical applications
- When messages are keys: is HMAC a dual-PRF?
- Multi-instance secure public-key encryption
- Certified Encryption Revisited
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Adaptive distributional security for garbling schemes with \(\mathcal{O}(|x|)\) online complexity
- Provably-secure remote memory attestation for heap overflow protection
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Network coding signature schemes against related-key attacks in the random oracle model
- The Security of Elastic Block Ciphers Against Key-Recovery Attacks
- On the Unprovable Security of 2-Key XCBC
- Delayed-key message authentication for streams
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- More efficient public-key cryptography with leakage and tamper resilience
- Practical non-malleable codes from symmetric-key primitives in 2-split-state model
- Minimizing the two-round tweakable Even-Mansour cipher
- Practical verifiable random function with RKA security
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434895)