Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 2086702 - MaRDI portal

scientific article; zbMATH DE number 2086702

From MaRDI portal
Publication:4737239

zbMath1055.94021MaRDI QIDQ4737239

Ueli M. Maurer

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320110.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (39)

How to build an ideal cipher: the indifferentiability of the Feistel constructionShort variable length domain extenders with beyond birthday bound securityComposition with knowledge assumptionsGarbling XOR gates ``for free in the standard modelFrom Indifferentiability to Constructive Cryptography (and Back)Tweak-Length Extension for Tweakable BlockciphersRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsRevisiting structure graphs: applications to CBC-MAC and EMACComposable and finite computational security of quantum message transmissionA unified and composable take on ratchetingDevice independent quantum key distribution using three-party pseudo-telepathyOn-line ciphers and the Hash-CBC constructionsTweakable Blockciphers with Asymptotically Optimal SecurityQuery-Complexity Amplification for Random OraclesIndifferentiability of the confusion-diffusion network and the cascade block cipherHardness-preserving reductions via cuckoo hashingA Proof of Security in O(2 n ) for the Benes SchemeAnonymous authenticated communicationWhen messages are keys: is HMAC a dual-PRF?Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)Tight security for key-alternating ciphers with correlated sub-keysUniversal reductions: reductions relative to stateful oraclesAdaptive security of multi-party protocols, revisitedA One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday BarrierState separation for code-based game-playing proofsOn the Security of Hash Functions Employing Blockcipher PostprocessingImproved direct product theorems for randomized query complexityThe Multi-user Security of Double EncryptionBuilding blockcipher from small-block tweakable blockcipherLuby-Rackoff Ciphers from Weak Round Functions?Tweakable Enciphering Schemes from Hash-Sum-ExpansionA New Mode of Operation for Block Ciphers and Length-Preserving MACsLarge scale, actively secure computation from LPN and free-XOR garbled circuitsRevisiting (R)CCA security and replay protectionThe “Coefficients H” TechniqueBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Overcoming impossibility results in composable security using interval-wise guarantees




This page was built for publication: