Concealment and Its Applications to Authenticated Encryption
From MaRDI portal
Publication:3000035
DOI10.1007/978-3-540-89411-7_8zbMath1217.68087OpenAlexW1588654716MaRDI QIDQ3000035
Publication date: 18 May 2011
Published in: Practical Signcryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89411-7_8
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Bit commitment using pseudorandomness
- Universal hashing and authentication codes
- Keying Hash Functions for Message Authentication
- High-bandwidth encryption with low-bandwidth smartcards
- On the security of remotely keyed encryption
- Fast Software Encryption
- Strengthening Digital Signatures Via Randomized Hashing
- The security of the cipher block chaining message authentication code
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Concealment and Its Applications to Authenticated Encryption