scientific article; zbMATH DE number 2086729
From MaRDI portal
Publication:4737269
zbMath1056.94517MaRDI QIDQ4737269
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320534.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (16)
Rogue Decryption Failures: Reconciling AE Robustness Notions ⋮ Partition oracles from weak key forgeries ⋮ A message franking channel ⋮ On Symmetric Encryption with Distinguishable Decryption Failures ⋮ Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment ⋮ ACE in chains: how risky is CBC encryption of binary executable files? ⋮ Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC ⋮ On Hiding a Plaintext Length by Preencryption ⋮ Cryptography in Theory and Practice: The Case of Encryption in IPsec ⋮ Cryptanalysis of the EPBC Authenticated Encryption Mode ⋮ Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption ⋮ The \texttt{Deoxys} AEAD family ⋮ Cryptographic Verification by Typing for a Sample Protocol Implementation ⋮ Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ⋮ The memory-tightness of authenticated encryption
This page was built for publication: