Using IND-CVA for constructing secure communication
From MaRDI portal
Recommendations
- Ciphertext verification security of symmetric encryption schemes
- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
- Information-Theoretic Security of Cryptographic Channels
- Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack
- Constructing confidential channels from authenticated channels-public-key encryption revisited
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 2086716 (Why is no real title available?)
- scientific article; zbMATH DE number 1842499 (Why is no real title available?)
- Ciphertext verification security of symmetric encryption schemes
This page was built for publication: Using IND-CVA for constructing secure communication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q848371)