The following pages link to (Q4941857):
Displaying 30 items.
- Bug attacks (Q321310) (← links)
- CBCR: CBC MAC with rotating transformations (Q350985) (← links)
- A new multi-linear universal hash family (Q369419) (← links)
- Tweakable block ciphers (Q451118) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- HalftimeHash: modern hashing without 64-bit multipliers or finite fields (Q832844) (← links)
- Variationally universal hashing (Q845822) (← links)
- On weak keys and forgery attacks against polynomial-based MAC schemes (Q901368) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Refined quorum systems (Q992512) (← links)
- Encryption modes with almost free message integrity (Q1021243) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test (Q1696144) (← links)
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers (Q1749791) (← links)
- Tweakable enciphering schemes using only the encryption function of a block cipher (Q1944173) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Revisiting construction of online cipher in hash-ECB-hash structure (Q2057180) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Rotational cryptanalysis on MAC algorithm chaskey (Q2229269) (← links)
- A trade-off between collision probability and key size in universal hashing using polynomials (Q2430412) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Concealment and Its Applications to Authenticated Encryption (Q3000035) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)
- Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования (Q3381883) (← links)
- Об одном семействе универсальных функций хеширования (Q5152401) (← links)