Pages that link to "Item:Q3593109"
From MaRDI portal
The following pages link to The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs (Q3593109):
Displaying 50 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Polly cracker, revisited (Q285245) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- An optimally fair coin toss (Q315542) (← links)
- CBCR: CBC MAC with rotating transformations (Q350985) (← links)
- TrCBC: another look at CBC-MAC (Q413314) (← links)
- A simple variant of the Merkle-Damgård scheme with a permutation (Q431787) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- IBE with tight security against selective opening and chosen-ciphertext attacks (Q780378) (← links)
- Signed Diffie-Hellman key exchange with tight security (Q826255) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries (Q1629393) (← links)
- On the structure of unconditional UC hybrid protocols (Q1631320) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Fiat-Shamir for highly sound protocols is instantiable (Q1637340) (← links)
- How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs (Q1688404) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- A robust and sponge-like PRNG with improved efficiency (Q1698655) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Optimal security proofs for full domain hash. Revisited (Q1747667) (← links)
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (Q1749791) (← links)
- Robust encryption (Q1753165) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Related-key security for pseudorandom functions beyond the linear barrier (Q1994635) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Practical public key encryption with selective opening security for receivers (Q2004703) (← links)
- Formalising \(\varSigma\)-protocols and commitment schemes using crypthol (Q2031427) (← links)
- Everybody's a target: scalability in public-key encryption (Q2055664) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- Analysing the HPKE standard (Q2056674) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- Revisiting construction of online cipher in hash-ECB-hash structure (Q2057180) (← links)
- Signed (group) Diffie-Hellman key exchange with tight security (Q2082164) (← links)
- Quantifying the security cost of migrating protocols to practice (Q2096478) (← links)
- The memory-tightness of authenticated encryption (Q2096479) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- A classification of computational assumptions in the algebraic group model (Q2096519) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- Privacy-preserving authenticated key exchange for constrained devices (Q2096615) (← links)
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions (Q2106709) (← links)
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols (Q2117066) (← links)
- Improved structured encryption for SQL databases via hybrid indexing (Q2117069) (← links)
- Quantum indistinguishability for public key encryption (Q2118562) (← links)
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability (Q2119003) (← links)