The following pages link to Fast Software Encryption (Q5902483):
Displaying 37 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Revisiting structure graphs: applications to CBC-MAC and EMAC (Q350515) (← links)
- CBCR: CBC MAC with rotating transformations (Q350985) (← links)
- On optimal cryptographic key derivation (Q388109) (← links)
- TrCBC: another look at CBC-MAC (Q413314) (← links)
- Notions and relations for RKA-secure permutation and function families (Q540472) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- On the optimality of non-linear computations for symmetric key primitives (Q1755961) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- On the security of \textsf{TrCBC} (Q2094391) (← links)
- Collision-resistant and pseudorandom function based on Merkle-Damgård hash function (Q2104455) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Blockcipher-based authenticated encryption: how small can we go? (Q2188958) (← links)
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations (Q2686166) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- PMAC with Parity: Minimizing the Query-Length Influence (Q2890005) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- Trick or Tweak: On the (In)security of OTR’s Tweaks (Q2958127) (← links)
- PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers (Q3092364) (← links)
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586) (← links)
- Generalizing PMAC Under Weaker Assumptions (Q3194621) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- On the Unprovable Security of 2-Key XCBC (Q3511165) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms (Q3600218) (← links)
- Order-Preserving Symmetric Encryption (Q3627437) (← links)
- Об одном семействе универсальных функций хеширования (Q5152401) (← links)
- On Efficient Message Authentication Via Block Cipher Design Techniques (Q5387102) (← links)
- Security Notions for Disk Encryption (Q5862675) (← links)
- Some properties of the DEC mode of operation of block ciphers (Q5871458) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- Quantum attacks on beyond-birthday-bound MACs (Q6167739) (← links)