scientific article; zbMATH DE number 1842499
From MaRDI portal
Publication:4783733
zbMATH Open1002.94529MaRDI QIDQ4783733FDOQ4783733
Authors: Hugo Krawczyk
Publication date: 8 December 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390310
Title of this publication is not available (Why is that?)
Recommendations
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- scientific article; zbMATH DE number 1583804
- Breaking and provably repairing the SSH authenticated encryption scheme
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
Cited In (42)
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- Advances in Cryptology - CRYPTO 2003
- A Provable-Security Treatment of the Key-Wrap Problem
- ACE in chains: how risky is CBC encryption of binary executable files?
- Applied Cryptography and Network Security
- Breaking and provably repairing the SSH authenticated encryption scheme
- Ciphertext verification security of symmetric encryption schemes
- Using IND-CVA for constructing secure communication
- Authenticated confidential channel establishment and the security of TLS-DHE
- A Modular Security Analysis of the TLS Handshake Protocol
- A cryptographic analysis of the TLS 1.3 handshake protocol
- On the security aspects of protocol CRISP
- Title not available (Why is that?)
- Plaintext-dependent decryption: a formal security treatment of SSH-CTR
- On symmetric encryption with distinguishable decryption failures
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Title not available (Why is that?)
- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Delayed-key message authentication for streams
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- The \texttt{Deoxys} AEAD family
- Universally Composable Security Analysis of TLS
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment
- The TLS handshake protocol: A modular analysis
- Composable and finite computational security of quantum message transmission
- Security notions for disk encryption
- Trick or tweak: on the (in)security of OTR's tweaks
- Revisiting (R)CCA security and replay protection
- A unified and composable take on ratcheting
- Decrypting without keys: the case of the GlobalPlatform SCP02 protocol
- On the insider security of MLS
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure
- Reconsidering generic composition
- Cryptanalysis of the authenticated encryption algorithm COFFE
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
- Modelling ciphersuite and version negotiation in the TLS protocol
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4783733)