scientific article; zbMATH DE number 1759277
From MaRDI portal
Publication:4536198
zbMath0994.68629MaRDI QIDQ4536198
Jonathan N. Katz, Mordechai M. Yung
Publication date: 25 June 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items (20)
Multiparty Proximity Testing with Dishonest Majority from Equality Testing ⋮ Robust Authenticated Encryption and the Limits of Symmetric Cryptography ⋮ Efficient schemes for committing authenticated encryption ⋮ Cryptanalysis of the AEAD and hash algorithm DryGASCON ⋮ Authenticated encryption for very short inputs ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Authenticated Encryption with Variable Stretch ⋮ Offset-based BBB-secure tweakable block-ciphers with updatable caches ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ The design and evolution of OCB ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ Some (in)sufficient conditions for secure hybrid encryption ⋮ Cryptography in Theory and Practice: The Case of Encryption in IPsec ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Encryption modes with almost free message integrity ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ The “Coefficients H” Technique ⋮ A symmetric cryptographic scheme for data integrity verification in cloud databases
This page was built for publication: