Implicit key-stretching security of encryption schemes
From MaRDI portal
Publication:6176047
DOI10.1007/978-3-031-29371-9_2OpenAlexW4361858951MaRDI QIDQ6176047
Stefan Lucks, Eik List, Jannis Bossert
Publication date: 21 August 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-29371-9_2
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Cites Work
- Unnamed Item
- On the optimality of non-linear computations for symmetric key primitives
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- On the Minimum Number of Multiplications Necessary for Universal Hash Functions
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- The Software Performance of Authenticated-Encryption Modes
- Online Ciphers from Tweakable Blockciphers
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- A Provable-Security Treatment of the Key-Wrap Problem
- RIV for Robust Authenticated Encryption
- On cryptography with auxiliary input
- Reconsidering Generic Composition
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Advances in Cryptology - CRYPTO 2003
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Implicit key-stretching security of encryption schemes