-
1
-
-
84951875471
-
Don’t panic! the cryptographers’ guide to robust authenticated (On-line) encryption
-
Abed, F., Forler, C., List, E., Lucks, S., Wenzel, J.: Don’t panic! the cryptographers’ guide to robust authenticated (On-line) encryption. Comments to CAESAR mailing list (2015)
-
(2015)
Comments to CAESAR Mailing List
-
-
Abed, F.1
Forler, C.2
List, E.3
Lucks, S.4
Wenzel, J.5
-
2
-
-
84916595381
-
How to securely release unverified plaintext in authenticated encryption
-
In: Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
-
Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: How to securely release unverified plaintext in authenticated encryption. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 105–125. Springer, Heidelberg (2014)
-
(2014)
ASIACRYPT 2014. LNCS
, vol.8873
, pp. 105-125
-
-
Andreeva, E.1
Bogdanov, A.2
Luykx, A.3
Mennink, B.4
Mouha, N.5
Yasuda, K.6
-
5
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)
-
(1998)
CRYPTO 1998. LNCS
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
6
-
-
84905390591
-
On symmetric encryption with distinguishable decryption failures
-
In: Moriai, S. (ed.), Springer, Heidelberg
-
Boldyreva, A., Degabriele, J.P., Paterson, K.G., Stam, M.: On symmetric encryption with distinguishable decryption failures. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 367–390. Springer, Heidelberg (2014)
-
(2014)
FSE 2013. LNCS
, vol.8424
, pp. 367-390
-
-
Boldyreva, A.1
Degabriele, J.P.2
Paterson, K.G.3
Stam, M.4
-
7
-
-
84901277219
-
KDM security in the hybrid framework
-
In: Benaloh, J. (ed.), Springer, Heidelberg
-
Davies, G.T., Stam, M.: KDM security in the hybrid framework. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 461–480. Springer, Heidelberg (2014)
-
(2014)
CT-RSA 2014. LNCS
, vol.8366
, pp. 461-480
-
-
Davies, G.T.1
Stam, M.2
-
8
-
-
33646842805
-
A designer’s guide to KEMs
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Dent, A.W.: A designer’s guide to KEMs. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 133–151. Springer, Heidelberg (2003)
-
(2003)
Cryptography and Coding 2003. LNCS
, vol.2898
, pp. 133-151
-
-
Dent, A.W.1
-
9
-
-
77956996186
-
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Dodis, Y., Pietrzak, K.: Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21–40. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 21-40
-
-
Dodis, Y.1
Pietrzak, K.2
-
10
-
-
57949107348
-
Leakage-resilient cryptography
-
IEEE Computer Society Press
-
Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 49th FOCS, pp. 293–302. IEEE Computer Society Press (2008)
-
(2008)
49Th FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
11
-
-
84942693703
-
Robust authenticated-encryption AEZ and the problem that it solves
-
In: Oswald, E., Fischlin, M. (eds.), Springer, Heidelberg
-
Hoang, V.T., Krovetz, T., Rogaway, P.: Robust authenticated-encryption AEZ and the problem that it solves. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 15–44. Springer, Heidelberg (2015)
-
(2015)
EUROCRYPT 2015. LNCS
, vol.9056
, pp. 15-44
-
-
Hoang, V.T.1
Krovetz, T.2
Rogaway, P.3
-
12
-
-
84951875474
-
Online authenticatedencryption and its nonce-reuse misuse-resistance
-
Hoang, V.T., Reyhanitabar, R., Rogaway, P., Vizár, D.: Online authenticatedencryption and its nonce-reuse misuse-resistance. In: Proceedings of CRYPTO (2015). http://eprint.iacr.org/2015/189
-
(2015)
Proceedings of CRYPTO
-
-
Hoang, V.T.1
Reyhanitabar, R.2
Rogaway, P.3
Vizár, D.4
-
13
-
-
84901650552
-
Reconsidering generic composition
-
In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
-
Namprempre, C., Rogaway, P., Shrimpton, T.: Reconsidering generic composition. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 257–274. Springer, Heidelberg (2014)
-
(2014)
EUROCRYPT 2014. LNCS
, vol.8441
, pp. 257-274
-
-
Namprempre, C.1
Rogaway, P.2
Shrimpton, T.3
-
14
-
-
0037673324
-
Authenticated-encryption with associated-data
-
Atluri, V. (ed.), ACM Press
-
Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) ACM CCS 2002, pp. 98–107. ACM Press (2002)
-
(2002)
ACM CCS 2002
, pp. 98-107
-
-
Rogaway, P.1
-
15
-
-
35048855085
-
Nonce-based symmetric encryption
-
Roy, B., Meier,W. (eds.), Springer, Heidelberg
-
Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier,W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348–359. Springer, Heidelberg (2004)
-
(2004)
FSE 2004. LNCS
, vol.3017
, pp. 348-359
-
-
Rogaway, P.1
-
16
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
In: Vaudenay, S. (ed.), Springer, Heidelberg
-
Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373–390. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
-
18
-
-
84947212539
-
Security flaws induced by CBC padding-applications to SSL, IPSEC, WTLS
-
In: Knudsen, L.R. (ed.), Springer, Heidelberg
-
Vaudenay, S.: Security flaws induced by CBC padding-applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534–546. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002. LNCS
, vol.2332
, pp. 534-546
-
-
Vaudenay, S.1
|