Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899297
DOI10.1007/11734727zbMath1185.05021OpenAlexW2493058093MaRDI QIDQ5899297
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Related Items
Towards tight security of cascaded LRW2 ⋮ Mirror theory and cryptography ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ The Relation Between CENC and NEMO ⋮ Building Secure Block Ciphers on Generic Attacks Assumptions ⋮ The “Coefficients H” Technique