Agile cryptography: a universally composable approach
From MaRDI portal
Publication:6587964
DOI10.1007/978-3-031-48624-1_18zbMATH Open1545.9405MaRDI QIDQ6587964FDOQ6587964
Authors: Christian Badertscher, Michele Ciampi, Aggelos Kiayias
Publication date: 15 August 2024
Recommendations
Cites Work
- Finding Collisions in the Full SHA-1
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- How to Break MD5 and Other Hash Functions
- Strong Key-Insulated Signature Schemes
- Title not available (Why is that?)
- Universally composable security
- Cryptographic agility and its relation to circular encryption
- New techniques for noninteractive zero-knowledge
- The first collision for full SHA-1
- Security of symmetric encryption against mass surveillance
- Updatable encryption with post-compromise security
- Universally composable subversion-resilient cryptography
- Fast and secure updatable encryption
- Universal composition with global subroutines: capturing global setup within plain UC
- Cryptography with updates
- Handling adaptive compromise for practical encryption schemes
- Sequential digital signatures for cryptographic software-update authentication
Cited In (1)
This page was built for publication: Agile cryptography: a universally composable approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6587964)