Information Security and Cryptology
From MaRDI portal
Publication:5897814
DOI10.1007/11599548zbMath1151.94581OpenAlexW3011166217MaRDI QIDQ5897814
Dengguo Feng, Peng Wang, Wenling Wu
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599548
Related Items
Variants of Wegman-Carter message authentication code supporting variable tag lengths, On modes of operations of a block cipher for authentication and authenticated encryption, Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes, Another look at XCB, How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers, Designing tweakable enciphering schemes using public permutations, Implicit key-stretching security of encryption schemes, Tweakable enciphering schemes using only the encryption function of a block cipher, Minimizing the two-round tweakable Even-Mansour cipher, An Improved Security Bound for HCTR, Tweaking key-alternating Feistel block ciphers, RIV for Robust Authenticated Encryption, Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, On the optimality of non-linear computations for symmetric key primitives, Tweakable Enciphering Schemes from Hash-Sum-Expansion, Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch, Authenticated Encryption with Small Stretch (or, How to Accelerate AERO), Revisiting construction of online cipher in hash-ECB-hash structure, \textsf{FAST}: disk encryption and beyond, Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal, A Domain Extender for the Ideal Cipher, Tweakable Pseudorandom Permutation from Generalized Feistel Structure, Attacks on beyond-birthday-bound MACs in the quantum setting