scientific article; zbMATH DE number 1394311
From MaRDI portal
Publication:4934727
zbMath0951.94521MaRDI QIDQ4934727
Publication date: 31 January 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (33)
Relations between robustness and RKA security under public-key encryption ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Related-Key Cryptanalysis of Midori ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Related-key attacks on the compression function of Streebog ⋮ On the related-key attack security of authenticated encryption schemes ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ And Rijndael? Automatic related-key differential analysis of Rijndael ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Improved Differential Cryptanalysis of CAST-128 and CAST-256 ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Notions and relations for RKA-secure permutation and function families ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ Clever Arbiters Versus Malicious Adversaries ⋮ Revisiting AES related-key differential attacks with constraint programming ⋮ X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Related-key attack on 5-round Kuznyechik ⋮ 3D: A Three-Dimensional Block Cipher ⋮ Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle ⋮ On the Role of Key Schedules in Attacks on Iterated Ciphers
This page was built for publication: