Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective
From MaRDI portal
Publication:6107277
DOI10.4230/LIPICS.ITC.2021.23zbMATH Open1517.94127OpenAlexW3188530052MaRDI QIDQ6107277
No author found.
Publication date: 3 July 2023
Full work available at URL: https://drops.dagstuhl.de/opus/volltexte/2021/14342/pdf/LIPIcs-ITC-2021-23.pdf/
Related Items (1)
Recommendations
- Unnamed Item π π
- Revisiting the wrong-key-randomization hypothesis π π
- Unclonable encryption, revisited π π
- On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes π π
- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks π π
- A Unified Approach to Related-Key Attacks π π
- How to fool an unbounded adversary with a short key π π
- Unaligned Rebound Attack: Application to Keccak π π
- Honey Encryption: Security Beyond the Brute-Force Bound π π
- Implicit key-stretching security of encryption schemes π π
This page was built for publication: Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective