On fingerprinting attacks and length-hiding encryption
From MaRDI portal
Publication:2152170
DOI10.1007/978-3-030-95312-6_15zbMath1492.94109OpenAlexW4210310743MaRDI QIDQ2152170
Tibor Jager, Kai Gellert, Tom Neuschulten, Lin Lyu
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_15
Cites Work
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Characterization of security notions for probabilistic private-key encryption
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- On Hiding a Plaintext Length by Preencryption
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
- A Provable-Security Treatment of the Key-Wrap Problem
- Unnamed Item
This page was built for publication: On fingerprinting attacks and length-hiding encryption