scientific article; zbMATH DE number 1942410
From MaRDI portal
Publication:4409106
zbMath1026.94531MaRDI QIDQ4409106
Gwenaëlle Martinet, F. Valette, Antoine Joux
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420017.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (8)
Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems ⋮ Moving the bar on computationally sound exclusive-or ⋮ On the Impossibility of Strong Encryption Over $\aleph_0$ ⋮ Full Disk Encryption: Bridging Theory and Practice ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption ⋮ Online Ciphers from Tweakable Blockciphers ⋮ How much data may be safely processed on one key in different modes?
This page was built for publication: