Pages that link to "Item:Q2835582"
From MaRDI portal
The following pages link to Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582):
Displaying 34 items.
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) (Q2102073) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher (Q2177631) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Towards closing the security gap of Tweak-aNd-Tweak (TNT) (Q2692356) (← links)
- Minimizing the two-round tweakable Even-Mansour cipher (Q2692357) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- An Inverse-Free Single-Keyed Tweakable Enciphering Scheme (Q2795970) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption (Q2820486) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework (Q2936613) (← links)
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC (Q2975805) (← links)
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption (Q2975808) (← links)
- The Counter mode with encrypted nonces and its extension to authenticated encryption (Q3383103) (← links)
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations (Q3604475) (← links)
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY (Q4975182) (← links)
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme (Q5871457) (← links)
- Toward a fully secure authenticated encryption scheme from a pseudorandom permutation (Q6157556) (← links)
- Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels (Q6166952) (← links)
- Offset-based BBB-secure tweakable block-ciphers with updatable caches (Q6169463) (← links)
- Implicit key-stretching security of encryption schemes (Q6176047) (← links)
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE (Q6488036) (← links)
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure (Q6535483) (← links)
- ZLR: a fast online authenticated encryption scheme achieving full security (Q6618633) (← links)
- Farasha: a provable permutation-based parallelizable PRF (Q6619859) (← links)
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm (Q6636391) (← links)