Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1303128 - MaRDI portal

scientific article; zbMATH DE number 1303128

From MaRDI portal
Publication:4249643

zbMath0994.94521MaRDI QIDQ4249643

Mihir Bellare, Ted Krovetz, Phillip Rogaway

Publication date: 8 October 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

Tweak-Length Extension for Tweakable BlockciphersFull indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsBeyond-birthday secure domain-preserving PRFs from a single permutationKeyed sum of permutations: a simpler RP-based PRFProof of mirror theory for a wide range of \(\xi_{\max }\)Salvaging Weak Security Bounds for Blockcipher-Based ConstructionsMulti-user security of the sum of truncated random permutationsImproved multi-user security using the squared-ratio methodLuby-Rackoff backwards with more users and more securityCategorization of faulty nonce misuse resistant message authenticationThe Relation Between CENC and NEMOQuantum attacks on PRFs based on public random permutationsRevisiting the indifferentiability of the sum of permutationsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionHow to build optimally secure PRFs using block ciphersA note on the chi-square method: a tool for proving cryptographic securityBuilding blockcipher from small-block tweakable blockcipherOn the XOR of Multiple Random PermutationsA Generic Method to Design Modes of Operation Beyond the Birthday BoundAnalysis of the single-permutation encrypted Davies-Meyer constructionCryptanalysis of Tweaked Versions of SMASH and ReparationBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACA Proof of Security in O(2 n ) for the Xor of Two Random PermutationsThe summation-truncation hybrid: reusing discarded bits for free




This page was built for publication: