Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Fast Software Encryption - MaRDI portal

Fast Software Encryption

From MaRDI portal
Publication:5713918

DOI10.1007/b98177zbMath1079.68552OpenAlexW2485295499MaRDI QIDQ5713918

Stefan Lucks

Publication date: 27 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98177




Related Items (22)

Relations between robustness and RKA security under public-key encryptionNon-malleable functions and their applicationsSecurity Against Related Randomness Attacks via Reconstructive ExtractorsConnecting tweakable and multi-key blockcipher securitySecure Message Authentication Against Related-Key AttackThe Chaining Lemma and Its ApplicationOn the Notions of PRP-RKA, KR and KR-RKA for Block CiphersEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierNon-malleable Codes with Split-State RefreshFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsNotions and relations for RKA-secure permutation and function familiesInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Clever Arbiters Versus Malicious AdversariesExpedient Non-malleability Notions for Hash FunctionsRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanOn Related-Secret PseudorandomnessDelayed-Key Message Authentication for StreamsAnalyzing the provable security bounds of GIFT-COFB and Photon-Beetle




This page was built for publication: Fast Software Encryption