Reforgeability of authenticated encryption schemes
From MaRDI portal
Recommendations
Cited in
(6)- Message extension attack against authenticated encryptions: application to PANDA
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Forgery and subkey recovery on CAESAR candidate iFeed
- scientific article; zbMATH DE number 7733666 (Why is no real title available?)
- Cryptanalysis of the authenticated encryption algorithm COFFE
This page was built for publication: Reforgeability of authenticated encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2014604)