Pages that link to "Item:Q1701456"
From MaRDI portal
The following pages link to Blockcipher-based MACs: beyond the birthday bound without message length (Q1701456):
Displaying 25 items.
- Generic attacks against beyond-birthday-bound MACs (Q1673397) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- Attacks on beyond-birthday-bound MACs in the quantum setting (Q2118560) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- How to Thwart Birthday Attacks against MACs via Small Randomness (Q3577961) (← links)
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited (Q3577962) (← links)
- Extending AES improvements: A proposal for Alpha-MAC in view of collision resistance (Q5042276) (← links)
- On the Security of Blockwise Secure Modes of Operation Beyond the Birthday Bound (Q5281581) (← links)
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security (Q6132423) (← links)
- Quantum linearization attacks (Q6157500) (← links)
- Fine-tuning the ISO/IEC standard \textsf{LightMAC} (Q6157560) (← links)
- Categorization of faulty nonce misuse resistant message authentication (Q6157561) (← links)
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher (Q6157576) (← links)
- On the Efficiency of ZMAC-Type Modes (Q6162315) (← links)
- Quantum attacks on beyond-birthday-bound MACs (Q6167739) (← links)
- A Note on the Security Framework of Two-key DbHtS MACs (Q6487350) (← links)
- \textsf{LightMAC}: fork it and make it faster (Q6584328) (← links)
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \) (Q6605894) (← links)
- Tight security bound of \textsf{2k-LightMAC\_Plus} (Q6623295) (← links)
- The multi-user security of MACs via universal hashing in the ideal cipher model (Q6636105) (← links)