Pages that link to "Item:Q2914248"
From MaRDI portal
The following pages link to Tweakable Blockciphers with Beyond Birthday-Bound Security (Q2914248):
Displaying 24 items.
- Almost universal forgery attacks on AES-based MAC's (Q494579) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- TNT: how to tweak a block cipher (Q2119027) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Building blockcipher from small-block tweakable blockcipher (Q2260794) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Beyond-birthday security for permutation-based Feistel networks (Q2657129) (← links)
- Towards closing the security gap of Tweak-aNd-Tweak (TNT) (Q2692356) (← links)
- Minimizing the two-round tweakable Even-Mansour cipher (Q2692357) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication (Q2790048) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- Tweakable Blockciphers with Asymptotically Optimal Security (Q2946875) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- Tweaking Even-Mansour Ciphers (Q3457110) (← links)
- Tweak-Length Extension for Tweakable Blockciphers (Q3460099) (← links)
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE (Q5048963) (← links)
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm (Q6636391) (← links)