scientific article; zbMATH DE number 1842499
From MaRDI portal
Publication:4783733
Recommendations
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- scientific article; zbMATH DE number 1583804
- Breaking and provably repairing the SSH authenticated encryption scheme
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
Cited in
(42)- Plaintext-dependent decryption: a formal security treatment of SSH-CTR
- Reconsidering generic composition
- A unified and composable take on ratcheting
- Revisiting (R)CCA security and replay protection
- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- The \texttt{Deoxys} AEAD family
- Decrypting without keys: the case of the GlobalPlatform SCP02 protocol
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
- Advances in Cryptology - CRYPTO 2003
- Delayed-key message authentication for streams
- ACE in chains: how risky is CBC encryption of binary executable files?
- Modelling ciphersuite and version negotiation in the TLS protocol
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Trick or tweak: on the (in)security of OTR's tweaks
- scientific article; zbMATH DE number 2080687 (Why is no real title available?)
- Universally Composable Security Analysis of TLS
- Cryptanalysis of the authenticated encryption algorithm COFFE
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption
- A Provable-Security Treatment of the Key-Wrap Problem
- On the insider security of MLS
- The TLS handshake protocol: A modular analysis
- Composable and finite computational security of quantum message transmission
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- A Modular Security Analysis of the TLS Handshake Protocol
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- On symmetric encryption with distinguishable decryption failures
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- On the security aspects of protocol CRISP
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- Breaking and provably repairing the SSH authenticated encryption scheme
- Ciphertext verification security of symmetric encryption schemes
- Using IND-CVA for constructing secure communication
- Authenticated confidential channel establishment and the security of TLS-DHE
- Security notions for disk encryption
- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
- A cryptographic analysis of the TLS 1.3 handshake protocol
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4783733)