Pages that link to "Item:Q1021246"
From MaRDI portal
The following pages link to Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246):
Displaying 29 items.
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- Fast and secure updatable encryption (Q2096496) (← links)
- Privacy-preserving authenticated key exchange for constrained devices (Q2096615) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- On fingerprinting attacks and length-hiding encryption (Q2152170) (← links)
- Hiding in plain sight: memory-tight proofs via randomness programming (Q2170068) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Improved, black-box, non-malleable encryption from semantic security (Q2413015) (← links)
- CCA updatable encryption against malicious re-encryption attacks (Q2691599) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- On the Security of the LAC Authenticated Encryption Algorithm (Q2817826) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- The Counter mode with encrypted nonces and its extension to authenticated encryption (Q3383103) (← links)
- Generic Construction of Stateful Identity Based Encryption (Q3399215) (← links)
- A Calculus for Game-Based Security Proofs (Q4933210) (← links)
- Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability (Q5739031) (← links)
- (Q6143713) (← links)
- On the complete non-malleability of the Fujisaki-Okamoto transform (Q6535123) (← links)
- Subversion-resilient authenticated encryption without random oracles (Q6535130) (← links)
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure (Q6535483) (← links)
- Privacy and integrity properties of ECIES scheme (Q6598560) (← links)
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability (Q6636499) (← links)
- Quantum public-key encryption with tamper-resilient public keys from one-way functions (Q6653003) (← links)
- Decrypting without keys: the case of the GlobalPlatform SCP02 protocol (Q6655873) (← links)
- Attribute-based keyed fully homomorphic encryption (Q6660543) (← links)