Pages that link to "Item:Q2835581"
From MaRDI portal
The following pages link to Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581):
Displayed 38 items.
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries (Q1629393) (← links)
- Random oracles and non-uniformity (Q1648794) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks (Q1749800) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Security analysis of NIST CTR-DRBG (Q2096485) (← links)
- Better concrete security for half-gates garbling (in the multi-instance setting) (Q2096549) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- The \(t\)-wise independence of substitution-permutation networks (Q2139644) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Towards closing the security gap of Tweak-aNd-Tweak (TNT) (Q2692356) (← links)
- Tight security analysis of 3-round key-alternating cipher with a single permutation (Q2692361) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Salvaging Weak Security Bounds for Blockcipher-Based Constructions (Q2958132) (← links)
- BBB Secure Nonce Based MAC Using Public Permutations (Q5048969) (← links)
- The Multi-user Security of Double Encryption (Q5738981) (← links)
- XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation (Q6061533) (← links)
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls (Q6083137) (← links)
- Revisiting BBS signatures (Q6083685) (← links)
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security (Q6132423) (← links)
- Multi-user security of the sum of truncated random permutations (Q6132432) (← links)
- A modular approach to the security analysis of two-permutation constructions (Q6135404) (← links)
- Improved multi-user security using the squared-ratio method (Q6145930) (← links)
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers (Q6145967) (← links)
- Toward a fully secure authenticated encryption scheme from a pseudorandom permutation (Q6157556) (← links)
- Tight security for key-alternating ciphers with correlated sub-keys (Q6157557) (← links)
- Fine-tuning the ISO/IEC standard \textsf{LightMAC} (Q6157560) (← links)
- Categorization of faulty nonce misuse resistant message authentication (Q6157561) (← links)
- Revisiting the security of \textsf{COMET} authenticated encryption scheme (Q6157568) (← links)
- Provably secure reflection ciphers (Q6166950) (← links)
- Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) (Q6169461) (← links)
- Offset-based BBB-secure tweakable block-ciphers with updatable caches (Q6169463) (← links)