Pages that link to "Item:Q5756643"
From MaRDI portal
The following pages link to New Proofs for NMAC and HMAC: Security Without Collision-Resistance (Q5756643):
Displaying 37 items.
- A simple variant of the Merkle-Damgård scheme with a permutation (Q431787) (← links)
- Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks (Q601800) (← links)
- Introducing the counter mode of operation to compressed sensing based encryption (Q903367) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- Quantum algorithms for the \(k\)-XOR problem (Q1633472) (← links)
- Improved generic attacks against hash-based MACs and HAIFA (Q1688402) (← links)
- Authenticated confidential channel establishment and the security of TLS-DHE (Q1698403) (← links)
- Simple and more efficient PRFs with tight security from LWE and matrix-DDH (Q1710687) (← links)
- On the security of the WOTS-PRF signature scheme (Q1726024) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- Updatable signatures and message authentication codes (Q2061942) (← links)
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function (Q2104455) (← links)
- Key-homomorphic pseudorandom functions from LWE with small modulus (Q2119025) (← links)
- Provable security analysis of FIDO2 (Q2128991) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later (Q2945721) (← links)
- On the Security of the Winternitz One-Time Signature Scheme (Q3011927) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers (Q3092364) (← links)
- Generalizing PMAC Under Weaker Assumptions (Q3194621) (← links)
- Key distribution. Episode 1: Quantum menace (Q3383114) (← links)
- Delayed-Key Message Authentication for Streams (Q3408201) (← links)
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC (Q3457119) (← links)
- Efficient One-Round Key Exchange in the Standard Model (Q3511152) (← links)
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms (Q3600218) (← links)
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography (Q3600371) (← links)
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 (Q3605393) (← links)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (Q3627431) (← links)
- Order-Preserving Symmetric Encryption (Q3627437) (← links)
- A Scheme to Base a Hash Function on a Block Cipher (Q3644205) (← links)
- Streebog compression function as PRF in secret-key settings (Q5042273) (← links)
- Related-key attacks on the compression function of Streebog (Q6051898) (← links)
- Keyed Streebog is a secure PRF and MAC (Q6051899) (← links)