The following pages link to (Q4783733):
Displayed 30 items.
- Ciphertext verification security of symmetric encryption schemes (Q848329) (← links)
- Using IND-CVA for constructing secure communication (Q848371) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Revisiting (R)CCA security and replay protection (Q2061954) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Composable and finite computational security of quantum message transmission (Q2175915) (← links)
- A unified and composable take on ratcheting (Q2175936) (← links)
- ACE in chains: how risky is CBC encryption of binary executable files? (Q2229272) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks (Q2293188) (← links)
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data (Q2293192) (← links)
- Cryptanalysis of the Authenticated Encryption Algorithm COFFE (Q2807230) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Trick or Tweak: On the (In)security of OTR’s Tweaks (Q2958127) (← links)
- Modelling Ciphersuite and Version Negotiation in the TLS Protocol (Q3194602) (← links)
- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy (Q3511148) (← links)
- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment (Q3540056) (← links)
- Cryptography in Theory and Practice: The Case of Encryption in IPsec (Q3593086) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption (Q3631375) (← links)
- Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC (Q4639476) (← links)
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes (Q4640336) (← links)
- Universally Composable Security Analysis of TLS (Q5505479) (← links)
- Security Notions for Disk Encryption (Q5862675) (← links)
- On the insider security of MLS (Q6104328) (← links)