Pages that link to "Item:Q1675220"
From MaRDI portal
The following pages link to Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory (Q1675220):
Displayed 25 items.
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- A note on the chi-square method: a tool for proving cryptographic security (Q1749799) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 (Q2055608) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- Beyond-birthday security for permutation-based Feistel networks (Q2657129) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Towards closing the security gap of Tweak-aNd-Tweak (TNT) (Q2692356) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- Extending AES improvements: A proposal for Alpha-MAC in view of collision resistance (Q5042276) (← links)
- Keyed sum of permutations: a simpler RP-based PRF (Q6057195) (← links)
- Proof of mirror theory for a wide range of \(\xi_{\max }\) (Q6083139) (← links)
- Multi-user security of the sum of truncated random permutations (Q6132432) (← links)
- A modular approach to the security analysis of two-permutation constructions (Q6135404) (← links)
- Improved multi-user security using the squared-ratio method (Q6145930) (← links)
- Fine-tuning the ISO/IEC standard \textsf{LightMAC} (Q6157560) (← links)
- Categorization of faulty nonce misuse resistant message authentication (Q6157561) (← links)
- \textsf{tHyENA}: making \textsf{HyENA} even smaller (Q6157569) (← links)
- The Relation Between CENC and NEMO (Q6162314) (← links)
- Quantum attacks on PRFs based on public random permutations (Q6169488) (← links)