scientific article

From MaRDI portal
Publication:2707451

zbMath0973.68059MaRDI QIDQ2707451

Chanathip Namprempre, Mihir Bellare

Publication date: 3 July 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Offset-based BBB-secure tweakable block-ciphers with updatable caches\textsf{ISAP+}: \textsf{ISAP} with fast authenticationInstantiability of classical random-oracle-model encryption transformsOn the post-quantum security of classical authenticated encryption schemesApplications of timed-release encryption with implicit authenticationDuplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsASC-1: An Authenticated Encryption Stream CipherExploring crypto dark matter: new simple PRF candidates and their applicationsOn modes of operations of a block cipher for authentication and authenticated encryptionHidden shift quantum cryptanalysis and implicationsOptimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsCryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionCiphertext verification security of symmetric encryption schemesUsing IND-CVA for constructing secure communicationRobust Authenticated Encryption and the Limits of Symmetric CryptographyEfficient schemes for committing authenticated encryptionSecure storage -- confidentiality and authenticationTraceable PRFs: Full Collusion Resistance and Active SecurityComposable and finite computational security of quantum message transmissionA fundamental flaw in the ++AE authenticated encryption modeOn-line ciphers and the Hash-CBC constructionsOn Symmetric Encryption with Distinguishable Decryption FailuresCryptanalysis of the AEAD and hash algorithm DryGASCONAuthenticated encryption for very short inputsFlexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacksXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationSelective Opening Security from Simulatable Data EncapsulationIntegrity Analysis of Authenticated Encryption Based on Stream CiphersAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelTwo faces of blindnessAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsTrick or Tweak: On the (In)security of OTR’s TweaksAuthenticated Encryption with Variable StretchJammin' on the deckWatermarkable public key encryption with efficient extraction under standard assumptionsOn the related-key attack security of authenticated encryption schemesRobust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin PolicySecurity of message authentication codes in the presence of key-dependent messagesOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsSponge-based authenticated encryption: security against quantum attackersParaDiSE: efficient threshold authenticated encryption in fully malicious modelAuthenticated confidential channel establishment and the security of TLS-DHEHold your breath, PRIMATEs are lightweightFASER128: Cryptanalysis and Its CountermeasureSecurity reductions for white-box key-storage in mobile paymentsSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingHow to Encrypt with the LPN ProblemSimulatable channels: extended security that is universally composable and easier to proveOn Efficient Message Authentication Via Block Cipher Design TechniquesConcealment and Its Applications to Authenticated EncryptionON THE SECURITY OF AEAD-CRYPTOSYSTEM OF THE GCM TYPERIV for Robust Authenticated EncryptionVerifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBCOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesSupersingular Isogeny-based Cryptography: A SurveyKey Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedObfuscation for cryptographic purposesThe TLS handshake protocol: A modular analysisModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorSome (in)sufficient conditions for secure hybrid encryptionCryptography in Theory and Practice: The Case of Encryption in IPsecA Provable-Security Treatment of the Key-Wrap ProblemA Modular Security Analysis of the TLS Handshake ProtocolBasing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric CryptographyEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionOAEP Is Secure under Key-Dependent MessagesHow to Incorporate Associated Data in Sponge-Based Authenticated EncryptionCMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networksEfficient KEMs with Partial Message RecoveryCryptanalysis of MORUSOn Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesA New Mode of Operation for Incremental Authenticated Encryption with Associated DataCryptanalysis of the Authenticated Encryption Algorithm COFFEThe \texttt{Deoxys} AEAD familyScalable attribute-based group key establishment: from~passive to active and deniableDesign of fast one-pass authenticated and randomized encryption schema using reversible cellular automataКоды аутентификации с секретностью (обзор)Locally decodable and updatable non-malleable codes and their applicationsAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Combiners for Chosen-Ciphertext SecuritySecurity under message-derived keys: signcryption in iMessageEncryption modes with almost free message integrityAuthenticated encryption: relations among notions and analysis of the generic composition paradigmSecurity Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersSecurity proofs for identity-based identification and signature schemesGeneric Construction of Stateful Identity Based EncryptionIdentity-based authenticated encryption with identity confidentialityCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Big-Key Symmetric Encryption: Resisting Key ExfiltrationDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesUniversally Composable Security Analysis of TLSHandling adaptive compromise for practical encryption schemesAnalyzing the provable security bounds of GIFT-COFB and Photon-BeetleA Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolConditional Reactive Simulatability




This page was built for publication: