Pages that link to "Item:Q3457111"
From MaRDI portal
The following pages link to Multi-key Security: The Even-Mansour Construction Revisited (Q3457111):
Displaying 25 items.
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds (Q1648810) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys (Q2101200) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Efficient schemes for committing authenticated encryption (Q2170073) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- On the adaptive security of MACs and PRFs (Q2692364) (← links)
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581) (← links)
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 (Q2835590) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Salvaging Weak Security Bounds for Blockcipher-Based Constructions (Q2958132) (← links)
- Secret Key and Private Key Constructions for Simple Multiterminal Source Models (Q5272096) (← links)
- The Multi-user Security of Double Encryption (Q5738981) (← links)
- Multi-user security of the sum of truncated random permutations (Q6132432) (← links)
- A modular approach to the security analysis of two-permutation constructions (Q6135404) (← links)
- Luby-Rackoff backwards with more users and more security (Q6157554) (← links)
- Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) (Q6169461) (← links)
- Related-cipher attacks: applications to Ballet and ANT (Q6535481) (← links)
- Farasha: a provable permutation-based parallelizable PRF (Q6619859) (← links)
- A sponge-based PRF with good multi-user security (Q6619860) (← links)
- The multi-user security of MACs via universal hashing in the ideal cipher model (Q6636105) (← links)
- The exact multi-user security of (tweakable) key alternating ciphers with a single permutation (Q6636386) (← links)
- Information-theoretic security with asymmetries (Q6652930) (← links)