On committing authenticated-encryption
From MaRDI portal
Publication:6109438
DOI10.1007/978-3-031-17146-8_14zbMath1524.68120OpenAlexW4296960192MaRDI QIDQ6109438
No author found.
Publication date: 28 July 2023
Published in: Computer Security – ESORICS 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-17146-8_14
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Fast message franking: from invisible salamanders to encryptment
- Message franking via committing authenticated encryption
- Efficient schemes for committing authenticated encryption
- The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
- Formalizing Human Ignorance
- The Software Performance of Authenticated-Encryption Modes
- Robust Encryption
- Robust Encryption, Revisited
- Reconsidering Generic Composition
- Progress in Cryptology - INDOCRYPT 2004
This page was built for publication: On committing authenticated-encryption