Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428137
DOI10.1007/b11817zbMath1122.94374OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428137
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Related Items (40)
Another Look at Tightness ⋮ Automated proofs of block cipher modes of operation ⋮ Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes ⋮ An extension of Cook’s elasti cipher ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ A new multi-linear universal hash family ⋮ On-line ciphers and the Hash-CBC constructions ⋮ Another look at XCB ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Implicit key-stretching security of encryption schemes ⋮ Tweakable enciphering schemes using only the encryption function of a block cipher ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ An Improved Security Bound for HCTR ⋮ Tweakable block ciphers ⋮ How to Build a Hash Function from Any Collision-Resistant Function ⋮ Tweaking key-alternating Feistel block ciphers ⋮ On the optimality of non-linear computations for symmetric key primitives ⋮ Notions and relations for RKA-secure permutation and function families ⋮ Building blockcipher from small-block tweakable blockcipher ⋮ A general mixing strategy for the ECB-Mix-ECB mode of operation ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ Tweakable Enciphering Schemes from Hash-Sum-Expansion ⋮ The Twin Diffie-Hellman Problem and Applications ⋮ On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Breaking tweakable enciphering schemes using Simon's algorithm ⋮ Efficient public key encryption with smallest ciphertext expansion from factoring ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Linicrypt: A Model for Practical Cryptography ⋮ \textsf{FAST}: disk encryption and beyond ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ The twin Diffie-Hellman problem and applications ⋮ A Domain Extender for the Ideal Cipher ⋮ Tweakable Pseudorandom Permutation from Generalized Feistel Structure ⋮ Security Notions for Disk Encryption
This page was built for publication: Advances in Cryptology - CRYPTO 2003