The following pages link to (Q4737258):
Displaying 50 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Revisiting structure graphs: applications to CBC-MAC and EMAC (Q350515) (← links)
- A lightweight alternative to PMAC (Q778935) (← links)
- Encryption modes with almost free message integrity (Q1021243) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication (Q1675192) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- A note on the chi-square method: a tool for proving cryptographic security (Q1749799) (← links)
- On the optimality of non-linear computations for symmetric key primitives (Q1755961) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security (Q2154057) (← links)
- Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing (Q2293040) (← links)
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations (Q2686166) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication (Q2785981) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Linicrypt: A Model for Practical Cryptography (Q2829955) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- PMAC with Parity: Minimizing the Query-Length Influence (Q2890005) (← links)
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption (Q2975808) (← links)
- PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers (Q3092364) (← links)
- Generalizing PMAC Under Weaker Assumptions (Q3194621) (← links)
- Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования (Q3381883) (← links)
- Authenticated Encryption Mode for Beyond the Birthday Bound Security (Q3506375) (← links)
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier (Q3525682) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- (Q3611002) (← links)
- A MAC Mode for Lightweight Block Ciphers (Q4639470) (← links)
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher (Q5281359) (← links)
- On Efficient Message Authentication Via Block Cipher Design Techniques (Q5387102) (← links)
- Fast Software Encryption (Q5473578) (← links)
- Fast Software Encryption (Q5713920) (← links)
- Fast Software Encryption (Q5713921) (← links)
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme (Q5871457) (← links)
- Криптосистема блочного гаммирования с аутентификацией (Q5871639) (← links)
- Topics in Cryptology – CT-RSA 2004 (Q5901702) (← links)
- Fast Software Encryption (Q5902499) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- Non-adaptive Group-Testing Aggregate MAC Scheme (Q6108623) (← links)
- Key-reduced variants of 3Kf9 with beyond-birthday-bound security (Q6132423) (← links)
- Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} (Q6135403) (← links)