scientific article; zbMATH DE number 2086702
From MaRDI portal
Publication:4737239
Recommendations
Cited in
(47)- Short variable length domain extenders with beyond birthday bound security
- Overcoming impossibility results in composable security using interval-wise guarantees
- Key-alternating ciphers and key-length extension: exact bounds and multi-user security
- A unified and composable take on ratcheting
- The Multi-user Security of Double Encryption
- Anonymous authenticated communication
- Tweak-length extension for tweakable blockciphers
- Revisiting (R)CCA security and replay protection
- Luby-Rackoff Ciphers from Weak Round Functions?
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- Composition with knowledge assumptions
- From Indifferentiability to Constructive Cryptography (and Back)
- Coupling of random systems
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- The “Coefficients H” Technique
- Theory of Cryptography
- Device independent quantum key distribution using three-party pseudo-telepathy
- Large scale, actively secure computation from LPN and free-XOR garbled circuits
- When messages are keys: is HMAC a dual-PRF?
- scientific article; zbMATH DE number 3844684 (Why is no real title available?)
- Revisiting structure graphs: applications to CBC-MAC and EMAC
- Composable and finite computational security of quantum message transmission
- Indifferentiability of the confusion-diffusion network and the cascade block cipher
- Query-complexity amplification for random oracles
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- State separation for code-based game-playing proofs
- Improved direct product theorems for randomized query complexity
- Hardness-preserving reductions via cuckoo hashing
- Garbling XOR gates ``for free in the standard model
- A Proof of Security in O(2 n ) for the Benes Scheme
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier
- Indistinguishability tests in the actor–partner interdependence model
- A Simple and Unified Method of Proving Indistinguishability
- Symbolic encryption with pseudorandom keys
- Universal reductions: reductions relative to stateful oracles
- Information-theoretic indistinguishability via the chi-squared method
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Quantum indistinguishability of random sponges
- Building blockcipher from small-block tweakable blockcipher
- Tweakable Enciphering Schemes from Hash-Sum-Expansion
- Tweakable blockciphers with asymptotically optimal security
- Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)
- Adaptive security of multi-party protocols, revisited
- On-line ciphers and the Hash-CBC constructions
- Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
- Tight security for key-alternating ciphers with correlated sub-keys
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737239)