Pages that link to "Item:Q1703940"
From MaRDI portal
The following pages link to Analyzing multi-key security degradation (Q1703940):
Displaying 17 items.
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Multi-key authenticated encryption with corruptions: reductions are lossy (Q1690202) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Practical significance of security bounds for standardized internally re-keyed block cipher modes (Q3383060) (← links)
- (Q4412957) (← links)
- Block cipher invariants as eigenvectors of correlation matrices (Q5918867) (← links)
- Multi-user security of the Elephant v2 authenticated encryption mode (Q6618587) (← links)
- A sponge-based PRF with good multi-user security (Q6619860) (← links)
- The multi-user security of MACs via universal hashing in the ideal cipher model (Q6636105) (← links)
- The exact multi-user security of 2-key triple DES (Q6636107) (← links)
- The exact multi-user security of (tweakable) key alternating ciphers with a single permutation (Q6636386) (← links)