Beyond birthday bound secure MAC in faulty nonce model
From MaRDI portal
Publication:2292655
DOI10.1007/978-3-030-17653-2_15zbMath1470.94085OpenAlexW2941145579MaRDI QIDQ2292655
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Publication date: 4 February 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17653-2_15
Related Items (12)
BBB Secure Nonce Based MAC Using Public Permutations ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Tight security of cascaded LRW2 ⋮ Proof of mirror theory for a wide range of \(\xi_{\max }\) ⋮ Multi-user security of the sum of truncated random permutations ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Improved multi-user security using the squared-ratio method ⋮ Toward a fully secure authenticated encryption scheme from a pseudorandom permutation ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ Multi-user BBB security of public permutations based MAC
This page was built for publication: Beyond birthday bound secure MAC in faulty nonce model