Authenticated encryption with key identification
From MaRDI portal
Publication:6135432
DOI10.1007/978-3-031-22969-5_7zbMATH Open1519.94153OpenAlexW4317928316MaRDI QIDQ6135432FDOQ6135432
Authors: Julia Len, Paul Grubbs, Thomas Ristenpart
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_7
Recommendations
Cites Work
- Robust Encryption
- Robust encryption, revisited
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Efficient schemes for committing authenticated encryption
- Fast Software Encryption
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
- Fast message franking: from invisible salamanders to encryptment
- Message franking via committing authenticated encryption
- Nonces are noticed: AEAD revisited
- Handling adaptive compromise for practical encryption schemes
- Anonymous AE
- Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs
Cited In (11)
- Криптосистема блочного гаммирования с аутентификацией
- More on key wrapping
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Probably secure keyed-function based authenticated encryption schemes for big data
- Title not available (Why is that?)
- Indifferentiable authenticated encryption
- Key rotation for authenticated encryption
- Authenticated and misuse-resistant encryption of key-dependent data
- Anonymous AE
- The committing security of MACs with applications to generic composition
- Efficient schemes for committing authenticated encryption
This page was built for publication: Authenticated encryption with key identification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135432)