Pages that link to "Item:Q5901702"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2004 (Q5901702):
Displaying 48 items.
- Automated proofs of block cipher modes of operation (Q287326) (← links)
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Tweakable block ciphers (Q451118) (← links)
- Notions and relations for RKA-secure permutation and function families (Q540472) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Another look at XCB (Q892505) (← links)
- A general mixing strategy for the ECB-Mix-ECB mode of operation (Q975544) (← links)
- Encryption modes with almost free message integrity (Q1021243) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- The twin Diffie-Hellman problem and applications (Q1037234) (← links)
- On the optimality of non-linear computations for symmetric key primitives (Q1755961) (← links)
- Double ciphertext mode: a proposal for secure backup (Q1758898) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- On-line ciphers and the Hash-CBC constructions (Q1928770) (← links)
- Tweakable enciphering schemes using only the encryption function of a block cipher (Q1944173) (← links)
- Breaking tweakable enciphering schemes using Simon's algorithm (Q2043415) (← links)
- \textsf{FAST}: disk encryption and beyond (Q2070266) (← links)
- Secure storage -- confidentiality and authentication (Q2172857) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Minimizing the two-round tweakable Even-Mansour cipher (Q2692357) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- Full Disk Encryption: Bridging Theory and Practice (Q2975807) (← links)
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal (Q3104710) (← links)
- Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes (Q3179498) (← links)
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- An Improved Security Bound for HCTR (Q3525680) (← links)
- (Q3611002) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- (Q4737258) (← links)
- An extension of Cook’s elasti cipher (Q5069967) (← links)
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher (Q5281359) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Advances in Cryptology - CRYPTO 2003 (Q5428137) (← links)
- Tweakable Enciphering Schemes from Hash-Sum-Expansion (Q5458214) (← links)
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure (Q5505455) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712197) (← links)
- Some properties of the DEC mode of operation of block ciphers (Q5871458) (← links)
- Parallel stream cipher for secure high-speed communications (Q5958512) (← links)
- Designing tweakable enciphering schemes using public permutations (Q6167296) (← links)
- Implicit key-stretching security of encryption schemes (Q6176047) (← links)
- Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE (Q6488031) (← links)
- The COLM Authenticated Encryption Scheme (Q6489331) (← links)
- Mystrium: wide block encryption efficient on entry-level processors (Q6660544) (← links)