Towards Tight Security Bounds for OMAC, XCBC and TMAC

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ASIACRYPT (28. : 2022 : Taipei) Advances in cryptology - ASIACRYPT 2022 ; Part 1
1. Verfasser: Chattopadhyay, Soumya (VerfasserIn)
Weitere Verfasser: Jha, Ashwin (VerfasserIn), Nandi, Mridul (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Full Quantum Equivalence of Group Action DLog and CDH, and More 2022 Montgomery, Hart
SwirTEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves: Faster Indifferentiable Hashing to Elliptic Curves 2022 Chavez-Saab, Jorge
Collusion-Resistant Functional Encryption for RAMs 2022 Ananth, Prabhanjan
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH 2022 Datta, Pratish
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forré 2022 Coutinho, Murilo
Enhancing Differential-Neural Cryptanalysis 2022 Bao, Zhenzhen
A Modular Approach to the Security Analysis of Two-Permutation Constructions 2022 Chen, Yu Long
Random Sources in Private Computation 2022 Couteau, Geoffroy
Efficient Adaptively-Secure Byzantine Agreement for Long Messages 2022 Bhangale, Amey
Attaining GOD Beyond Honest Majority with Friends and Foes 2022 Hegde, Aditya
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model 2022 Cascudo, Ignacio
A Universally Composable Non-interactive Aggregate Cash System 2022 Jia, Yanxue
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients 2022 Abusalah, Hamza
Cryptographic Primitives with Hinting Property 2022 Alamati, Navid
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 2022 Qin, Lingyue
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery 2022 Song, Ling
Towards Practical Topology-Hiding Computation 2022 Li, Shuaishuai
Non-interactive Mimblewimble Transactions, Revisited 2022 Fuchsbauer, Georg
Algebraic Meet-in-the-Middle Attack on LowMC 2022 Liu, Fukang
Witness Encryption and Null-IO from Evasive LWE 2022 Vaikuntanathan, Vinod
Alle Artikel auflisten