scientific article; zbMATH DE number 1962141
From MaRDI portal
Publication:4418525
zbMath1039.94527MaRDI QIDQ4418525
Publication date: 10 August 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2612/26120033.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (11)
Another Look at Tightness ⋮ PMAC with Parity: Minimizing the Query-Length Influence ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ CBCR: CBC MAC with rotating transformations ⋮ TrCBC: another look at CBC-MAC ⋮ Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} ⋮ On the Unprovable Security of 2-Key XCBC ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ On the optimality of non-linear computations for symmetric key primitives ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ On the security of \textsf{TrCBC}
This page was built for publication: