Pages that link to "Item:Q5897814"
From MaRDI portal
The following pages link to Information Security and Cryptology (Q5897814):
Displaying 24 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- Another look at XCB (Q892505) (← links)
- On the optimality of non-linear computations for symmetric key primitives (Q1755961) (← links)
- Tweakable enciphering schemes using only the encryption function of a block cipher (Q1944173) (← links)
- Revisiting construction of online cipher in hash-ECB-hash structure (Q2057180) (← links)
- \textsf{FAST}: disk encryption and beyond (Q2070266) (← links)
- Attacks on beyond-birthday-bound MACs in the quantum setting (Q2118560) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Minimizing the two-round tweakable Even-Mansour cipher (Q2692357) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal (Q3104710) (← links)
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- An Improved Security Bound for HCTR (Q3525680) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- Tweakable Enciphering Schemes from Hash-Sum-Expansion (Q5458214) (← links)
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure (Q5505455) (← links)
- Designing tweakable enciphering schemes using public permutations (Q6167296) (← links)
- Populating the zoo of rugged pseudorandom permutations (Q6562588) (← links)
- Mystrium: wide block encryption efficient on entry-level processors (Q6660544) (← links)