Fast Software Encryption

From MaRDI portal
Publication:5902483

DOI10.1007/b93938zbMath1254.94033OpenAlexW2505253445WikidataQ56387660 ScholiaQ56387660MaRDI QIDQ5902483

Kaoru Kurosawa, Tetsu Iwata

Publication date: 5 January 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b93938




Related Items (46)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelPMAC with Parity: Minimizing the Query-Length InfluenceRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingOn modes of operations of a block cipher for authentication and authenticated encryptionWeak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesGeneralizing PMAC Under Weaker AssumptionsRevisiting structure graphs: applications to CBC-MAC and EMACCBCR: CBC MAC with rotating transformationsOn optimal cryptographic key derivationAttacks and Security Proofs of EAX-PrimeAuthenticated encryption for very short inputsBlockcipher-based authenticated encryption: how small can we go?Non-adaptive Group-Testing Aggregate MAC SchemeAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityTrick or Tweak: On the (In)security of OTR’s TweaksTrCBC: another look at CBC-MACKey-reduced variants of 3Kf9 with beyond-birthday-bound securityTowards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}Quantum attacks against BBB secure PRFs or MACs built from public random permutationsQuantum linearization attacksFine-tuning the ISO/IEC standard \textsf{LightMAC}\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherOn the Efficiency of ZMAC-Type ModesOn the Unprovable Security of 2-Key XCBCQuantum attacks on beyond-birthday-bound MACsOn the security of keyed hashing based on public permutationsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityImproved security analysis for nonce-based enhanced hash-then-mask MACsOn Efficient Message Authentication Via Block Cipher Design TechniquesОб одном семействе универсальных функций хешированияOn the optimality of non-linear computations for symmetric key primitivesNotions and relations for RKA-secure permutation and function familiesA Provable-Security Treatment of the Key-Wrap ProblemKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsCryptanalysis of OCB2: attacks on authenticity and confidentialityOrder-Preserving Symmetric EncryptionOne-Key Compression Function Based MAC with Security Beyond Birthday BoundEfficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchTight security bounds for double-block hash-then-sum MACsAuthenticated encryption: relations among notions and analysis of the generic composition paradigmPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersBreaking Symmetric Cryptosystems Using Quantum Period FindingOn the security of \textsf{TrCBC}Security Notions for Disk EncryptionCollision-resistant and pseudorandom function based on Merkle-Damgård hash functionSome properties of the DEC mode of operation of block ciphers


Uses Software



This page was built for publication: Fast Software Encryption