Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Analyzing multi-key security degradation

From MaRDI portal
Publication:1703940
Jump to:navigation, search

DOI10.1007/978-3-319-70697-9_20zbMath1417.94071OpenAlexW2768802245MaRDI QIDQ1703940

Atul Luykx, Bart Mennink, Kenneth G. Paterson

Publication date: 8 March 2018

Full work available at URL: https://ir.cwi.nl/pub/27258


zbMATH Keywords

AESmulti-userGCMweak keysTLSmulti-keymulti-oracle


Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (11)

Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ Tightness subtleties for multi-user PKE notions ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ Efficient schemes for committing authenticated encryption ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ On the adaptive security of MACs and PRFs ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Practical significance of security bounds for standardized internally re-keyed block cipher modes ⋮ Multi-user BBB security of public permutations based MAC




This page was built for publication: Analyzing multi-key security degradation

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:1703940&oldid=14026842"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 1 February 2024, at 07:08.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki