Pages that link to "Item:Q2820486"
From MaRDI portal
The following pages link to Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption (Q2820486):
Displaying 31 items.
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting (Q2035448) (← links)
- Tornado: automatic generation of probing-secure masked bitsliced implementations (Q2055659) (← links)
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher (Q2177631) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- An observation on NORX, BLAKE2, and ChaCha (Q2274480) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations (Q2672297) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- (Q4425701) (← links)
- Faster individual discrete logarithms in finite fields of composite extension degree (Q4612570) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- Computation of a 30750-bit binary field discrete logarithm (Q4956935) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers (Q6061536) (← links)
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher (Q6157576) (← links)
- Offset-based BBB-secure tweakable block-ciphers with updatable caches (Q6169463) (← links)
- Multi-user security of the Elephant v2 authenticated encryption mode (Q6618587) (← links)
- Farasha: a provable permutation-based parallelizable PRF (Q6619859) (← links)
- Quantum cryptanalysis of OTR and OPP: attacks on confidentiality, and key-recovery (Q6620050) (← links)
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm (Q6636391) (← links)