Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942411 - MaRDI portal

scientific article; zbMATH DE number 1942411

From MaRDI portal
Publication:4409107

zbMath1026.94533MaRDI QIDQ4409107

Ronald L. Rivest, Moses Liskov, David Wagner

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420031.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (75)

Strong Authenticity with Leakage Under Weak and Falsifiable Physical AssumptionsOn the resilience of Even-Mansour to invariant permutationsAutomated proofs of block cipher modes of operationFormal analysis of symbolic authenticityTowards tight security of cascaded LRW2eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesUC-secure and Contributory Password-Authenticated Group Key ExchangeTweak-Length Extension for Tweakable Blockciphers\textsf{Light-OCB}: parallel lightweight authenticated cipher with full securityImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Connecting tweakable and multi-key blockcipher securityOn-line ciphers and the Hash-CBC constructionsTweakable Blockciphers with Asymptotically Optimal Security\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsAuthenticated encryption for very short inputsQCB is blindly unforgeableBlockcipher-based authenticated encryption: how small can we go?A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentialityOn the Notions of PRP-RKA, KR and KR-RKA for Block CiphersSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionTrick or Tweak: On the (In)security of OTR’s TweaksHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersJammin' on the deckQCB: efficient quantum-secure authenticated encryption\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherOn the Efficiency of ZMAC-Type ModesOverloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channelsDesigning tweakable enciphering schemes using public permutationsOffset-based BBB-secure tweakable block-ciphers with updatable cachesTweakable enciphering schemes using only the encryption function of a block cipherOutput masking of tweakable Even-Mansour can be eliminated for message authentication codeTowards closing the security gap of Tweak-aNd-Tweak (TNT)Minimizing the two-round tweakable Even-Mansour cipherBeyond birthday bound secure fresh rekeying: application to authenticated encryptionJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherAn Improved Security Bound for HCTRImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCTweakable block ciphersSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsUnnamed ItemTweaking key-alternating Feistel block ciphersModeling Random Oracles Under Unpredictable QueriesRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsThe design and evolution of OCBThe Software Performance of Authenticated-Encryption Modes\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherDeterministic encryption with the Thorp shuffleNotions and relations for RKA-secure permutation and function familiesAn efficient format-preserving encryption mode for practical domainsBuilding blockcipher from small-block tweakable blockcipherA Provable-Security Treatment of the Key-Wrap ProblemTweakable Enciphering Schemes from Hash-Sum-ExpansionOnline Ciphers from Tweakable BlockciphersEfficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelAnalysis of the CAESAR Candidate SilverCryptanalysis of OCB2: attacks on authenticity and confidentialityAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Password-Authenticated Group Key Agreement with Adaptive Security and ContributivenessSquare Attack on 7-Round Kiasu-BCAssisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow SlicingPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersOn the impossibility of highly-efficient blockcipher-based hash functionsLinicrypt: A Model for Practical Cryptography\textsf{FAST}: disk encryption and beyondBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block CiphersXPX: Generalized Tweakable Even-Mansour with Improved Security GuaranteesA Domain Extender for the Ideal CipherThe \(\mathsf{mF}\) mode of authenticated encryption with associated dataTweakable Pseudorandom Permutation from Generalized Feistel StructureThe MALICIOUS framework: embedding backdoors into tweakable block ciphersSecurity Notions for Disk EncryptionModifying an Enciphering Scheme After DeploymentTNT: how to tweak a block cipher




This page was built for publication: