scientific article; zbMATH DE number 1842499

From MaRDI portal
Publication:4783733

zbMath1002.94529MaRDI QIDQ4783733

Hugo Krawczyk

Publication date: 8 December 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390310

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolvedCiphertext verification security of symmetric encryption schemesUsing IND-CVA for constructing secure communicationModelling Ciphersuite and Version Negotiation in the TLS ProtocolComposable and finite computational security of quantum message transmissionA unified and composable take on ratchetingOn Symmetric Encryption with Distinguishable Decryption FailuresOn the insider security of MLSTrick or Tweak: On the (In)security of OTR’s TweaksEnforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin PolicyAuthenticated confidential channel establishment and the security of TLS-DHEImmunising CBC Mode Against Padding Oracle Attacks: A Formal Security TreatmentACE in chains: how risky is CBC encryption of binary executable files?Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBCOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesA cryptographic analysis of the TLS 1.3 handshake protocolThe TLS handshake protocol: A modular analysisCryptography in Theory and Practice: The Case of Encryption in IPsecA Provable-Security Treatment of the Key-Wrap ProblemA Modular Security Analysis of the TLS Handshake ProtocolAn efficient public-key searchable encryption scheme secure against inside keyword guessing attacksEnabling efficient and verifiable multi-keyword ranked search over encrypted cloud dataCryptanalysis of the Authenticated Encryption Algorithm COFFEThe \texttt{Deoxys} AEAD familyComputationally Sound Formalization of Rerandomizable RCCA Secure EncryptionAuthenticated encryption: relations among notions and analysis of the generic composition paradigmRevisiting (R)CCA security and replay protectionCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersUniversally Composable Security Analysis of TLSSecurity Notions for Disk Encryption




This page was built for publication: