KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more
From MaRDI portal
Publication:6547985
Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- Blockcipher-Based Hashing Revisited
- Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
- Efficient schemes for committing authenticated encryption
- Fast message franking: from invisible salamanders to encryptment
- How to securely release unverified plaintext in authenticated encryption
- Indifferentiable authenticated encryption
- Message franking via committing authenticated encryption
- On committing authenticated-encryption
- One Way Hash Functions and DES
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
- The preimage security of double-block-length compression functions
This page was built for publication: KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547985)