Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:2778864

zbMath0981.94036MaRDI QIDQ2778864

Charanjit S. Jutla

Publication date: 21 March 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450529

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Practical key recovery attacks on FlexAEADASC-1: An Authenticated Encryption Stream CipherAutomated proofs of block cipher modes of operationOn modes of operations of a block cipher for authentication and authenticated encryptionCryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor NetworksRobust Authenticated Encryption and the Limits of Symmetric CryptographyConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesOffset-based BBB-secure tweakable block-ciphers with updatable cachesA One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday BarrierFull Disk Encryption: Bridging Theory and PracticeTweakable block ciphersConcealment and Its Applications to Authenticated EncryptionRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsThe design and evolution of OCBThe Software Performance of Authenticated-Encryption ModesOn the optimality of non-linear computations for symmetric key primitivesModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorA Provable-Security Treatment of the Key-Wrap ProblemCryptanalysis of MORUSCryptanalysis of the Authenticated Encryption Algorithm COFFEEncryption modes with almost free message integrityAuthenticated encryption: relations among notions and analysis of the generic composition paradigmCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersConditional Reactive Simulatability