scientific article; zbMATH DE number 862975
From MaRDI portal
Publication:4871720
zbMath0925.94085MaRDI QIDQ4871720
Publication date: 2 April 1996
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (17)
On the resilience of Even-Mansour to invariant permutations ⋮ Towards tight security of cascaded LRW2 ⋮ Revisiting structure graphs: applications to CBC-MAC and EMAC ⋮ Quantum cryptanalysis of 5 rounds Feistel schemes and Benes schemes ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Tight security of cascaded LRW2 ⋮ Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} ⋮ Fine-tuning the ISO/IEC standard \textsf{LightMAC} ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ Revisiting the security of \textsf{COMET} authenticated encryption scheme ⋮ \textsf{tHyENA}: making \textsf{HyENA} even smaller ⋮ How to build optimally secure PRFs using block ciphers ⋮ About Feistel Schemes with Six (or More) Rounds ⋮ EHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATION ⋮ Pseudorandomness of Camellia-like scheme ⋮ The Counter mode with encrypted nonces and its extension to authenticated encryption ⋮ A Proof of Security in O(2 n ) for the Xor of Two Random Permutations
This page was built for publication: