The following pages link to (Q4737258):
Displaying 40 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Revisiting structure graphs: applications to CBC-MAC and EMAC (Q350515) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- A note on the chi-square method: a tool for proving cryptographic security (Q1749799) (← links)
- On the optimality of non-linear computations for symmetric key primitives (Q1755961) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security (Q2154057) (← links)
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations (Q2686166) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Linicrypt: A Model for Practical Cryptography (Q2829955) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- PMAC with Parity: Minimizing the Query-Length Influence (Q2890005) (← links)
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption (Q2975808) (← links)
- PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers (Q3092364) (← links)
- Generalizing PMAC Under Weaker Assumptions (Q3194621) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier (Q3525682) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- A MAC Mode for Lightweight Block Ciphers (Q4639470) (← links)
- On Efficient Message Authentication Via Block Cipher Design Techniques (Q5387102) (← links)
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme (Q5871457) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- Quantum attacks on beyond-birthday-bound MACs (Q6167739) (← links)
- \textsf{LightMAC}: fork it and make it faster (Q6584328) (← links)
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \) (Q6605894) (← links)
- Farasha: a provable permutation-based parallelizable PRF (Q6619859) (← links)
- Multimixer-156: universal keyed hashing based on integer multiplication and cyclic shift (Q6623290) (← links)
- Tight security bound of \textsf{2k-LightMAC\_Plus} (Q6623295) (← links)
- A quantum-secure partial parallel MAC QPCBC (Q6651925) (← links)