scientific article; zbMATH DE number 1942411
From MaRDI portal
Publication:4409107
zbMath1026.94533MaRDI QIDQ4409107
Ronald L. Rivest, Moses Liskov, David Wagner
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420031.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (75)
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Automated proofs of block cipher modes of operation ⋮ Formal analysis of symbolic authenticity ⋮ Towards tight security of cascaded LRW2 ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ UC-secure and Contributory Password-Authenticated Group Key Exchange ⋮ Tweak-Length Extension for Tweakable Blockciphers ⋮ \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Connecting tweakable and multi-key blockcipher security ⋮ On-line ciphers and the Hash-CBC constructions ⋮ Tweakable Blockciphers with Asymptotically Optimal Security ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Authenticated encryption for very short inputs ⋮ QCB is blindly unforgeable ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality ⋮ On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Trick or Tweak: On the (In)security of OTR’s Tweaks ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Jammin' on the deck ⋮ QCB: efficient quantum-secure authenticated encryption ⋮ \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher ⋮ On the Efficiency of ZMAC-Type Modes ⋮ Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Offset-based BBB-secure tweakable block-ciphers with updatable caches ⋮ Tweakable enciphering schemes using only the encryption function of a block cipher ⋮ Output masking of tweakable Even-Mansour can be eliminated for message authentication code ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ An Improved Security Bound for HCTR ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ Tweakable block ciphers ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Unnamed Item ⋮ Tweaking key-alternating Feistel block ciphers ⋮ Modeling Random Oracles Under Unpredictable Queries ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ The design and evolution of OCB ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ Deterministic encryption with the Thorp shuffle ⋮ Notions and relations for RKA-secure permutation and function families ⋮ An efficient format-preserving encryption mode for practical domains ⋮ Building blockcipher from small-block tweakable blockcipher ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ Tweakable Enciphering Schemes from Hash-Sum-Expansion ⋮ Online Ciphers from Tweakable Blockciphers ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ Analysis of the CAESAR Candidate Silver ⋮ Cryptanalysis of OCB2: attacks on authenticity and confidentiality ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Square Attack on 7-Round Kiasu-BC ⋮ Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ On the impossibility of highly-efficient blockcipher-based hash functions ⋮ Linicrypt: A Model for Practical Cryptography ⋮ \textsf{FAST}: disk encryption and beyond ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees ⋮ A Domain Extender for the Ideal Cipher ⋮ The \(\mathsf{mF}\) mode of authenticated encryption with associated data ⋮ Tweakable Pseudorandom Permutation from Generalized Feistel Structure ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ Security Notions for Disk Encryption ⋮ Modifying an Enciphering Scheme After Deployment ⋮ TNT: how to tweak a block cipher
This page was built for publication: