Pages that link to "Item:Q1690202"
From MaRDI portal
The following pages link to Multi-key authenticated encryption with corruptions: reductions are lossy (Q1690202):
Displaying 10 items.
- Analyzing multi-key security degradation (Q1703940) (← links)
- Handling adaptive compromise for practical encryption schemes (Q2096475) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- On fingerprinting attacks and length-hiding encryption (Q2152170) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Digital Signatures with Memory-Tight Security in the Multi-challenge Setting (Q6041292) (← links)
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks (Q6057196) (← links)
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model (Q6085265) (← links)
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness (Q6157528) (← links)
- SoK: public key encryption with openings (Q6635892) (← links)