Puncturable key wrapping and its applications
From MaRDI portal
Publication:6132430
DOI10.1007/978-3-031-22966-4_22zbMath1519.94042OpenAlexW4320154922MaRDI QIDQ6132430
Kenneth G. Paterson, Felix Günther, Matilda Backendal
Publication date: 16 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22966-4_22
Related Items (1)
Cites Work
- Unnamed Item
- Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
- Updatable encryption with post-compromise security
- Key rotation for authenticated encryption
- Handling adaptive compromise for practical encryption schemes
- Nonces are noticed: AEAD revisited
- (R)CCA secure updatable encryption with integrity protection
- Constrained Pseudorandom Functions and Their Applications
- Adaptive Security of Constrained PRFs
- A Forward-Secure Symmetric-Key Derivation Protocol
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- A Provable-Security Treatment of the Key-Wrap Problem
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- How to use indistinguishability obfuscation
- 0-RTT Key Exchange with Full Forward Secrecy
- Functional Signatures and Pseudorandom Functions
- Constraining Pseudorandom Functions Privately
- New Negative Results on Differing-Inputs Obfuscation
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Symmetric Key Exchange with Full Forward Security and Robust Synchronization
- Puncturable key wrapping and its applications
This page was built for publication: Puncturable key wrapping and its applications