On the security of remotely keyed encryption
From MaRDI portal
Publication:4639343
DOI10.1007/BFb0052349zbMath1385.94055OpenAlexW1524320659MaRDI QIDQ4639343
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bfb0052349
Related Items (4)
Breaking the Shin-Shin-Rhee remotely keyed encryption schemes ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ Speeding up exponentiation using an untrusted computational resource
Cites Work
- On the Security of Two MAC Algorithms
- Foiling Birthday Attacks in Length-Doubling Transformations
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- High-bandwidth encryption with low-bandwidth smartcards
- Two practical and provably secure block ciphers: BEAR and LION
- Faster Luby-Rackoff ciphers
This page was built for publication: On the security of remotely keyed encryption