scientific article; zbMATH DE number 1842499
From MaRDI portal
Publication:4783733
zbMath1002.94529MaRDI QIDQ4783733
Publication date: 8 December 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390310
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ Ciphertext verification security of symmetric encryption schemes ⋮ Using IND-CVA for constructing secure communication ⋮ Modelling Ciphersuite and Version Negotiation in the TLS Protocol ⋮ Composable and finite computational security of quantum message transmission ⋮ A unified and composable take on ratcheting ⋮ On Symmetric Encryption with Distinguishable Decryption Failures ⋮ On the insider security of MLS ⋮ Trick or Tweak: On the (In)security of OTR’s Tweaks ⋮ Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment ⋮ ACE in chains: how risky is CBC encryption of binary executable files? ⋮ Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC ⋮ On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ The TLS handshake protocol: A modular analysis ⋮ Cryptography in Theory and Practice: The Case of Encryption in IPsec ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ A Modular Security Analysis of the TLS Handshake Protocol ⋮ An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks ⋮ Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data ⋮ Cryptanalysis of the Authenticated Encryption Algorithm COFFE ⋮ The \texttt{Deoxys} AEAD family ⋮ Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Revisiting (R)CCA security and replay protection ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ Universally Composable Security Analysis of TLS ⋮ Security Notions for Disk Encryption
This page was built for publication: