Agile cryptography: a universally composable approach
From MaRDI portal
Publication:6587964
Recommendations
Cites work
- scientific article; zbMATH DE number 1406782 (Why is no real title available?)
- Cryptographic agility and its relation to circular encryption
- Cryptography with updates
- Fast and secure updatable encryption
- Finding Collisions in the Full SHA-1
- Handling adaptive compromise for practical encryption schemes
- How to Break MD5 and Other Hash Functions
- New techniques for noninteractive zero-knowledge
- Security of symmetric encryption against mass surveillance
- Sequential digital signatures for cryptographic software-update authentication
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- Strong Key-Insulated Signature Schemes
- The first collision for full SHA-1
- Universal composition with global subroutines: capturing global setup within plain UC
- Universally composable security
- Universally composable subversion-resilient cryptography
- Updatable encryption with post-compromise security
This page was built for publication: Agile cryptography: a universally composable approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6587964)