Pages that link to "Item:Q2948322"
From MaRDI portal
The following pages link to Robust Authenticated-Encryption AEZ and the Problem That It Solves (Q2948322):
Displaying 34 items.
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Nonce-misuse security of the SAEF authenticated encryption mode (Q832377) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Simulatable channels: extended security that is universally composable and easier to prove (Q1710688) (← links)
- Quantum key-recovery on full AEZ (Q1746983) (← links)
- Deterministic encryption with the Thorp shuffle (Q1753170) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- \textsf{FAST}: disk encryption and beyond (Q2070266) (← links)
- TNT: how to tweak a block cipher (Q2119027) (← links)
- Certified compilation for cryptography: extended x86 instructions and constant-time verification (Q2152025) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Survey of information security (Q2385398) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Trick or Tweak: On the (In)security of OTR’s Tweaks (Q2958127) (← links)
- Authenticated Encryption with Variable Stretch (Q2958131) (← links)
- Weak Keys for AEZ, and the External Key Padding Attack (Q2975806) (← links)
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption (Q2975808) (← links)
- AEZ: Anything-But EaZy in Hardware (Q3179486) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography (Q3460101) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications (Q5056019) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5918865) (← links)
- $\mathsf{sMGM}$: parameterizable AEAD mode (Q6051895) (← links)
- Designing tweakable enciphering schemes using public permutations (Q6167296) (← links)