Pages that link to "Item:Q5712200"
From MaRDI portal
The following pages link to Progress in Cryptology - INDOCRYPT 2004 (Q5712200):
Displaying 50 items.
- Automated proofs of block cipher modes of operation (Q287326) (← links)
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- A new multi-linear universal hash family (Q369419) (← links)
- A session key caching and prefetching scheme for secure communication in cluster systems (Q666163) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Another look at XCB (Q892505) (← links)
- On weak keys and forgery attacks against polynomial-based MAC schemes (Q901368) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Commitment and authentication systems (Q1039270) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- The Missing Difference problem, and its applications to counter mode encryption (Q1648860) (← links)
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje (Q1726679) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- Cryptanalysis of \texttt{NORX} v2.0 (Q2010594) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC (Q2043323) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Revisiting construction of online cipher in hash-ECB-hash structure (Q2057180) (← links)
- \textsf{FAST}: disk encryption and beyond (Q2070266) (← links)
- The memory-tightness of authenticated encryption (Q2096479) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Quantum key distribution using universal hash functions over finite fields (Q2107057) (← links)
- Attacks on beyond-birthday-bound MACs in the quantum setting (Q2118560) (← links)
- Partition oracles from weak key forgeries (Q2149813) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Secure GCM implementation on AVR (Q2413216) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Implementing GCM on ARMv8 (Q2790037) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Improved Three-Way Split Formulas for Binary Polynomial Multiplication (Q2889884) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Trick or Tweak: On the (In)security of OTR’s Tweaks (Q2958127) (← links)
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes (Q2958130) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)