Fast Software Encryption
From MaRDI portal
Publication:5902483
DOI10.1007/b93938zbMath1254.94033OpenAlexW2505253445WikidataQ56387660 ScholiaQ56387660MaRDI QIDQ5902483
Publication date: 5 January 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b93938
Related Items (46)
On tight quantum security of HMAC and NMAC in the quantum random oracle model ⋮ PMAC with Parity: Minimizing the Query-Length Influence ⋮ Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ Generalizing PMAC Under Weaker Assumptions ⋮ Revisiting structure graphs: applications to CBC-MAC and EMAC ⋮ CBCR: CBC MAC with rotating transformations ⋮ On optimal cryptographic key derivation ⋮ Attacks and Security Proofs of EAX-Prime ⋮ Authenticated encryption for very short inputs ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Non-adaptive Group-Testing Aggregate MAC Scheme ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Trick or Tweak: On the (In)security of OTR’s Tweaks ⋮ TrCBC: another look at CBC-MAC ⋮ Key-reduced variants of 3Kf9 with beyond-birthday-bound security ⋮ Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} ⋮ Quantum attacks against BBB secure PRFs or MACs built from public random permutations ⋮ Quantum linearization attacks ⋮ Fine-tuning the ISO/IEC standard \textsf{LightMAC} ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ On the Efficiency of ZMAC-Type Modes ⋮ On the Unprovable Security of 2-Key XCBC ⋮ Quantum attacks on beyond-birthday-bound MACs ⋮ On the security of keyed hashing based on public permutations ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Об одном семействе универсальных функций хеширования ⋮ On the optimality of non-linear computations for symmetric key primitives ⋮ Notions and relations for RKA-secure permutation and function families ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ Cryptanalysis of OCB2: attacks on authenticity and confidentiality ⋮ Order-Preserving Symmetric Encryption ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch ⋮ Tight security bounds for double-block hash-then-sum MACs ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ On the security of \textsf{TrCBC} ⋮ Security Notions for Disk Encryption ⋮ Collision-resistant and pseudorandom function based on Merkle-Damgård hash function ⋮ Some properties of the DEC mode of operation of block ciphers
Uses Software
This page was built for publication: Fast Software Encryption