The following pages link to (Q2707428):
Displaying 30 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- Security proof of the canonical form of self-synchronizing stream ciphers (Q510485) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Threshold ECDSA with an offline recovery party (Q2053769) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Cryptanalysis of the AEAD and hash algorithm DryGASCON (Q2673773) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- A New Pseudorandom Generator from Collision-Resistant Hash Functions (Q2890004) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Authenticated Encryption with Variable Stretch (Q2958131) (← links)
- Full Disk Encryption: Bridging Theory and Practice (Q2975807) (← links)
- Concealment and Its Applications to Authenticated Encryption (Q3000035) (← links)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (Q3092172) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography (Q3460101) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- Cryptography in Theory and Practice: The Case of Encryption in IPsec (Q3593086) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- OAEP Is Secure under Key-Dependent Messages (Q3600394) (← links)
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security (Q3634492) (← links)
- Parameterized property testing of functions (Q4638061) (← links)
- $\mathsf{sMGM}$: parameterizable AEAD mode (Q6051895) (← links)
- Keyed Streebog is a secure PRF and MAC (Q6051899) (← links)
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup (Q6095326) (← links)