In the present work we investigate into security proofs techniques in symmetric cryptography with aim at authenticated encryption schemes. The results of this area are in each chapter shown and proven. We begin with studying security notions of symmetric cryptography and relations among them. Then we analyze security of authenticated encryption schemes designed by generic composition and introduce keyed hash functions and the NMAC scheme. The last topic we study is an authenticated encryption with associated data. Finally, we describe presented proofs generally and unify the methods used
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected ...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security frame...
We study authenticated encryption (AE) schemes, or symmetric cryptographic protocols designed to pro...
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both pr...
Abstract—For most basic cryptographic tasks, such as public-key encryption, digital signatures, auth...
It is hard to overestimate the ubiquity and importance of securecommunications and information proce...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
. This paper investigates security proofs for protocols that employ asymmetric (public-key) techniqu...
This thesis studies security of various cryptographic primitives which provide for data authenticati...
Abstract. We study homomorphic authenticated encryption, where privacy and authenticity of data are ...
This material intends to be a brief introduction to symmetric and asymmetric cryptographic primitive...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected ...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security frame...
We study authenticated encryption (AE) schemes, or symmetric cryptographic protocols designed to pro...
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both pr...
Abstract—For most basic cryptographic tasks, such as public-key encryption, digital signatures, auth...
It is hard to overestimate the ubiquity and importance of securecommunications and information proce...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
. This paper investigates security proofs for protocols that employ asymmetric (public-key) techniqu...
This thesis studies security of various cryptographic primitives which provide for data authenticati...
Abstract. We study homomorphic authenticated encryption, where privacy and authenticity of data are ...
This material intends to be a brief introduction to symmetric and asymmetric cryptographic primitive...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected ...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...