The following pages link to Fast Software Encryption (Q5713917):
Displaying 35 items.
- Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems (Q831949) (← links)
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Simulatable channels: extended security that is universally composable and easier to prove (Q1710688) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- The memory-tightness of authenticated encryption (Q2096479) (← links)
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle (Q2096604) (← links)
- Security of public key encryption against resetting attacks (Q2152048) (← links)
- Hiding in plain sight: memory-tight proofs via randomness programming (Q2170068) (← links)
- A practical forgery attack on Lilliput-AE (Q2188961) (← links)
- Cryptanalysis of the AEAD and hash algorithm DryGASCON (Q2673773) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers (Q2953865) (← links)
- Authenticated Encryption with Variable Stretch (Q2958131) (← links)
- Full Disk Encryption: Bridging Theory and Practice (Q2975807) (← links)
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption (Q2975808) (← links)
- Grey-Box Steganography (Q3010419) (← links)
- PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers (Q3092364) (← links)
- Cryptanalysis of the Light-Weight Cipher A2U2 (Q3104709) (← links)
- Practical significance of security bounds for standardized internally re-keyed block cipher modes (Q3383060) (← links)
- How much data may be safely processed on one key in different modes? (Q3383073) (← links)
- The Counter mode with encrypted nonces and its extension to authenticated encryption (Q3383103) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications (Q5056019) (← links)
- Nonce-Based Key Agreement Protocol Against Bad Randomness (Q5205019) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- О стойкости режима аутентифицированного шифрования с дополнительными данными MGM к угрозе нарушения конфиденциальности;On the security of authenticated (Q6118049) (← links)