The following pages link to The “Coefficients H” Technique (Q3644210):
Displaying 50 items.
- Revisiting structure graphs: applications to CBC-MAC and EMAC (Q350515) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- (Quantum) cryptanalysis of misty schemes (Q831628) (← links)
- Nonce-misuse security of the SAEF authenticated encryption mode (Q832377) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Random oracles and non-uniformity (Q1648794) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Mirror theory and cryptography (Q1675488) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- A robust and sponge-like PRNG with improved efficiency (Q1698655) (← links)
- A note on the chi-square method: a tool for proving cryptographic security (Q1749799) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Compactness of hashing modes and efficiency beyond Merkle tree (Q2056724) (← links)
- Provable related-key security of contracting Feistel networks (Q2057179) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Security analysis of NIST CTR-DRBG (Q2096485) (← links)
- Better concrete security for half-gates garbling (in the multi-instance setting) (Q2096549) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security (Q2154057) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff (Q2232120) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- Multi-user security bound for filter permutators in the random oracle model (Q2420473) (← links)
- Beyond-birthday security for permutation-based Feistel networks (Q2657129) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Adaptively code-correlation robustness functions and its applications to private set intersection (Q2682918) (← links)
- Towards closing the security gap of Tweak-aNd-Tweak (TNT) (Q2692356) (← links)
- Minimizing the two-round tweakable Even-Mansour cipher (Q2692357) (← links)
- Tight security analysis of 3-round key-alternating cipher with a single permutation (Q2692361) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers (Q2942832) (← links)
- Tweaking Even-Mansour Ciphers (Q3457110) (← links)
- Multi-key Security: The Even-Mansour Construction Revisited (Q3457111) (← links)
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC (Q3457119) (← links)
- Tweak-Length Extension for Tweakable Blockciphers (Q3460099) (← links)
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length (Q4639468) (← links)
- The Multi-user Security of Double Encryption (Q5738981) (← links)
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication (Q6101280) (← links)
- Designing tweakable enciphering schemes using public permutations (Q6167296) (← links)