Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1024009 - MaRDI portal

scientific article; zbMATH DE number 1024009

From MaRDI portal
Publication:4341684

zbMath0868.94037MaRDI QIDQ4341684

Lars R. Knudsen

Publication date: 20 July 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (37)

Relations between robustness and RKA security under public-key encryptionRelated-key analysis of generalized Feistel networks with expanding round functionsSome Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64New types of cryptanalytic attacks using related keysRelated-Key Cryptanalysis of MidoriSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemWeak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesSecurity analysis of SIMECK block cipher against related-key impossible differentialEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsSecure Message Authentication Against Related-Key AttackOn the related-key attack security of authenticated encryption schemesPractical-time related-key attack on GOST with secret S-boxesWhen messages are keys: is HMAC a dual-PRF?Continuously non-malleable codes against bounded-depth tamperingA Unified Approach to Related-Key AttacksDifferential Cryptanalysis of the ICE Encryption AlgorithmA methodology for differential-linear cryptanalysis and its applicationsLBlock: A Lightweight Block CipherOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelRelated-key security for pseudorandom functions beyond the linear barrierFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsNotions and relations for RKA-secure permutation and function familiesThe (related-key) impossible boomerang attack and its application to the AES block cipherNew related-key rectangle attacks on reduced AES-192 and AES-256Some (in)sufficient conditions for secure hybrid encryptionSlide Attacks on a Class of Hash FunctionsClever Arbiters Versus Malicious AdversariesАтака на шифрсистему ГОСТ 28147-89 с 12 связанными ключамиRelated-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the WeaknessesExpedient Non-malleability Notions for Hash FunctionsRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanAttacking 9 and 10 Rounds of AES-256Provable related-key security of contracting Feistel networksUnnamed ItemNew Related-Key Boomerang Attacks on AESReflection Cryptanalysis of Some CiphersOn the Role of Key Schedules in Attacks on Iterated Ciphers




This page was built for publication: