scientific article; zbMATH DE number 1024009
From MaRDI portal
Publication:4341684
zbMath0868.94037MaRDI QIDQ4341684
Publication date: 20 July 1997
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (37)
Relations between robustness and RKA security under public-key encryption ⋮ Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 ⋮ New types of cryptanalytic attacks using related keys ⋮ Related-Key Cryptanalysis of Midori ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ Secure Message Authentication Against Related-Key Attack ⋮ On the related-key attack security of authenticated encryption schemes ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ A Unified Approach to Related-Key Attacks ⋮ Differential Cryptanalysis of the ICE Encryption Algorithm ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ LBlock: A Lightweight Block Cipher ⋮ On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Notions and relations for RKA-secure permutation and function families ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ New related-key rectangle attacks on reduced AES-192 and AES-256 ⋮ Some (in)sufficient conditions for secure hybrid encryption ⋮ Slide Attacks on a Class of Hash Functions ⋮ Clever Arbiters Versus Malicious Adversaries ⋮ Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами ⋮ Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ Expedient Non-malleability Notions for Hash Functions ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Attacking 9 and 10 Rounds of AES-256 ⋮ Provable related-key security of contracting Feistel networks ⋮ Unnamed Item ⋮ New Related-Key Boomerang Attacks on AES ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ On the Role of Key Schedules in Attacks on Iterated Ciphers
This page was built for publication: