Pages that link to "Item:Q3452360"
From MaRDI portal
The following pages link to On Fast and Provably Secure Message Authentication Based on Universal Hashing (Q3452360):
Displaying 37 items.
- Attacks on quantum key distribution protocols that employ non-ITS authentication (Q265393) (← links)
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- A new multi-linear universal hash family (Q369419) (← links)
- Improving classical authentication over a quantum channel (Q406240) (← links)
- The universality of iterated hashing over variable-length strings (Q412371) (← links)
- Tweakable block ciphers (Q451118) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- Variationally universal hashing (Q845822) (← links)
- On weak keys and forgery attacks against polynomial-based MAC schemes (Q901368) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- The circulant hash revisited (Q2033521) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- A trade-off between collision probability and key size in universal hashing using polynomials (Q2430412) (← links)
- MRD hashing. (Q2572989) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 (Q2889874) (← links)
- Tweakable Blockciphers with Asymptotically Optimal Security (Q2946875) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Generalizing PMAC Under Weaker Assumptions (Q3194621) (← links)
- MMH: Software message authentication in the Gbit/second rates (Q4639339) (← links)
- MRD Hashing (Q4639446) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- EHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATION (Q5151199) (← links)
- Categorization of faulty nonce misuse resistant message authentication (Q6157561) (← links)
- Quantum attacks on PRFs based on public random permutations (Q6169488) (← links)
- Beyond Uber: instantiating generic groups via PGGs (Q6169556) (← links)
- Universal hashing based on field multiplication and (near-)MDS matrices (Q6186343) (← links)
- On the security of keyed hashing based on public permutations (Q6186773) (← links)