Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation (English)
- New search for: Zhu, B.
- New search for: Tan, Y.
- New search for: Gong, G.
- New search for: Zhu, B.
- New search for: Tan, Y.
- New search for: Gong, G.
- New search for: Abdalla, Michel
- New search for: Nita-Rotaru, Cristina
- New search for: Dahab, Ricardo
In:
Cryptography and network security
8257
;
20-38
;
2013
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
-
Contributors:Zhu, B. ( author ) / Tan, Y. ( author ) / Gong, G. ( author ) / Abdalla, Michel / Nita-Rotaru, Cristina / Dahab, Ricardo
-
Conference:International conference; 12th, Cryptography and network security ; 2013 ; Paraty, Brazil
-
Published in:Cryptography and network security , 8257 ; 20-38LECTURE NOTES IN COMPUTER SCIENCE , 8257 ; 20-38
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2013-01-01
-
Size:19 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Differential Attacks on Generalized Feistel SchemesNachef, V. / Volte, E. / Patarin, J. et al. | 2013
- 20
-
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of OperationZhu, B. / Tan, Y. / Gong, G. et al. | 2013
- 39
-
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?Gao, S. / Chen, H. / Fan, L. et al. | 2013
- 57
-
Zero Knowledge Proofs from Ring-LWEXie, X. / Xue, R. / Wang, M. et al. | 2013
- 74
-
Zero Knowledge with Rubik's Cubes and Non-abelian GroupsVolte, E. / Patarin, J. / Nachef, V. et al. | 2013
- 92
-
Efficient Modular NIZK Arguments from Shift and ProductFauzi, P. / Lipmaa, H. / Zhang, B. et al. | 2013
- 122
-
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard ModelLi, Y. / Yang, Z. et al. | 2013
- 139
-
Achieving Correctness in Fair Rational Secret SharingDe, S.J. / Pal, A.K. et al. | 2013
- 162
-
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow AnalysisKheir, N. / Wolley, C. et al. | 2013
- 179
-
Resource Access Control in the Facebook ModelChronopoulos, K. / Gouseti, M. / Kiayias, A. et al. | 2013
- 199
-
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving GestureShrestha, B. / Saxena, N. / Harrison, J. et al. | 2013
- 218
-
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General DefinitionBellare, M. / O Neill, A. et al. | 2013
- 235
-
Efficient Lossy Trapdoor Functions Based on Subgroup Membership AssumptionsXue, H. / Li, B. / Lu, X. / Jia, D. / Liu, Y. et al. | 2013
- 251
-
Unique Aggregate Signatures with Applications to Distributed Verifiable Random FunctionsKuchta, V. / Manulis, M. et al. | 2013
- 271
-
A Practical Related-Key Boomerang Attack for the Full MMB Block CipherAshur, T. / Dunkelman, O. et al. | 2013
- 291
-
Truncated Differential Analysis of Reduced-Round LBlockEmami, S. / McDonald, C. / Pieprzyk, J. / Steinfeld, R. et al. | 2013
- 309
-
How to Update Documents Verifiably in Searchable Symmetric EncryptionKurosawa, K. / Ohtaki, Y. et al. | 2013
- 329
-
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear MapsZhang, L.F. / Safavi-Naini, R. et al. | 2013