Authenticated encryption with key identification
From MaRDI portal
Publication:6135432
Recommendations
Cites work
- scientific article; zbMATH DE number 5009203 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Anonymous AE
- Efficient schemes for committing authenticated encryption
- Fast Software Encryption
- Fast message franking: from invisible salamanders to encryptment
- Handling adaptive compromise for practical encryption schemes
- Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs
- Message franking via committing authenticated encryption
- Nonces are noticed: AEAD revisited
- Robust Encryption
- Robust encryption, revisited
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
Cited in
(11)- The committing security of MACs with applications to generic composition
- Криптосистема блочного гаммирования с аутентификацией
- Anonymous AE
- More on key wrapping
- Authenticated and misuse-resistant encryption of key-dependent data
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- scientific article; zbMATH DE number 7339513 (Why is no real title available?)
- Probably secure keyed-function based authenticated encryption schemes for big data
- Indifferentiable authenticated encryption
- Key rotation for authenticated encryption
- Efficient schemes for committing authenticated encryption
This page was built for publication: Authenticated encryption with key identification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135432)