Analyzing multi-key security degradation
From MaRDI portal
Publication:1703940
DOI10.1007/978-3-319-70697-9_20zbMath1417.94071OpenAlexW2768802245MaRDI QIDQ1703940
Atul Luykx, Bart Mennink, Kenneth G. Paterson
Publication date: 8 March 2018
Full work available at URL: https://ir.cwi.nl/pub/27258
Related Items (11)
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ Tightness subtleties for multi-user PKE notions ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ Efficient schemes for committing authenticated encryption ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ On the adaptive security of MACs and PRFs ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Practical significance of security bounds for standardized internally re-keyed block cipher modes ⋮ Multi-user BBB security of public permutations based MAC
This page was built for publication: Analyzing multi-key security degradation