Pages that link to "Item:Q3618662"
From MaRDI portal
The following pages link to New Blockcipher Modes of Operation with Beyond the Birthday Bound Security (Q3618662):
Displaying 14 items.
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- The Missing Difference problem, and its applications to counter mode encryption (Q1648860) (← links)
- A note on the chi-square method: a tool for proving cryptographic security (Q1749799) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication (Q2790048) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (Q4639486) (← links)
- A Generic Method to Design Modes of Operation Beyond the Birthday Bound (Q5452269) (← links)