Pages that link to "Item:Q2835585"
From MaRDI portal
The following pages link to EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585):
Displaying 27 items.
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC (Q1673414) (← links)
- A note on the chi-square method: a tool for proving cryptographic security (Q1749799) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 (Q2055608) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- \(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC (Q2274243) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- How to build optimally secure PRFs using block ciphers (Q2692365) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- How to Thwart Birthday Attacks against MACs via Small Randomness (Q3577961) (← links)
- An Integrated ECC-MAC Based on RS Code (Q3627422) (← links)
- BBB Secure Nonce Based MAC Using Public Permutations (Q5048969) (← links)
- E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels (Q5268369) (← links)
- Keyed sum of permutations: a simpler RP-based PRF (Q6057195) (← links)
- Multi-user security of the sum of truncated random permutations (Q6132432) (← links)
- A modular approach to the security analysis of two-permutation constructions (Q6135404) (← links)
- Quantum linearization attacks (Q6157500) (← links)
- Categorization of faulty nonce misuse resistant message authentication (Q6157561) (← links)
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher (Q6157576) (← links)
- Forgery attacks on several beyond-birthday-bound secure MACs (Q6595812) (← links)
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \) (Q6605894) (← links)