The following pages link to (Q4418525):
Displaying 16 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- CBCR: CBC MAC with rotating transformations (Q350985) (← links)
- TrCBC: another look at CBC-MAC (Q413314) (← links)
- CBC MACs for arbitrary-length messages: The three-key constructions (Q814842) (← links)
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm (Q1021246) (← links)
- On the optimality of non-linear computations for symmetric key primitives (Q1755961) (← links)
- On the security of \textsf{TrCBC} (Q2094391) (← links)
- Another Look at Tightness (Q2889878) (← links)
- PMAC with Parity: Minimizing the Query-Length Influence (Q2890005) (← links)
- On the Unprovable Security of 2-Key XCBC (Q3511165) (← links)
- On Efficient Message Authentication Via Block Cipher Design Techniques (Q5387102) (← links)
- Fast Software Encryption (Q5902483) (← links)
- Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} (Q6135403) (← links)
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \) (Q6605894) (← links)
- Parallel verification of serial MAC and AE modes (Q6618590) (← links)
- The multi-user security of MACs via universal hashing in the ideal cipher model (Q6636105) (← links)