Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
186 | Erik Zenner |
Nonce Generators and the Nonce Reset Problem. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce |
97 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
97 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher |
80 | Eun-Jun Yoon, Kee-Young Yoo |
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. |
ICIC (3) |
2008 |
DBLP DOI BibTeX RDF |
Protocol, Cryptanalysis, Key agreement, Chaotic maps, Nonce |
71 | Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai |
Efficient disk encryption and verification through trusted nonce. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Phillip Rogaway |
Nonce-Based Symmetric Encryption. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
Initialization vector, provable security, modes of operation, symmetric encryption, nonces |
55 | Chang-Hyun Kim, Myungwhan Choi |
TCP Recovering Multiple Packet Losses over Wireless Links Using Nonce. |
ICOIN |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Kouichi Sakurai, Tsuyoshi Takagi |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Jean Paul Degabriele, Vukasin Karadzic |
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
44 | Jean Paul Degabriele, Vukasin Karadzic |
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. |
CRYPTO (4) |
2022 |
DBLP DOI BibTeX RDF |
|
44 | Geng Wang, Haiyang Zhang, Fengmei Liu |
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
42 | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won |
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange |
42 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
38 | Wenbo Shi, Hyeong Seon Yoo |
Efficient Nonce-Based Authentication Scheme Using Token-Update. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | J. Philip Benkard |
Nonce Functions. |
APL |
1990 |
DBLP DOI BibTeX RDF |
APL |
33 | Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu 0002, Hongjun He |
Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ayesha Altaf, M. Younus Javed, Attiq Ahmed |
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Privcy and Key Management, security |
33 | David A. McGrew, Scott R. Fluhrer |
The Security of the Extended Codebook (XCB) Mode of Operation. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Dayin Wang, Dongdai Lin, Wenling Wu |
OPMAC: One-Key Poly1305 MAC. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Carter-Wegman MAC, Universal Hash Family, Block cipher, Message Authentication Code, Pseudorandom Function, Pseudorandom Permutation |
33 | Dayin Wang, Dongdai Lin, Wenling Wu |
An Improved Poly1305 MAC. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Phillip Rogaway |
Authenticated-encryption with associated-data. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption |
26 | Rosario Gennaro |
Randomness in Cryptography. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
cryptography, predictable, randomness, nonce |
22 | Yiming Gao, Jinghui Wang, Honggang Hu, Binang He |
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
22 | Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu 0011, Sudong Ma, Hao Bai |
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu |
Nonce-misuse resilience of Romulus-N and GIFT-COFB. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan |
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
22 | David Arps, Laura Kallmeyer, Younes Samih, Hassan Sajjad 0001 |
Multilingual Nonce Dependency Treebanks: Understanding how LLMs represent and process syntactic structure. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matteo Golinelli, Francesco Bonomi, Bruno Crispo |
The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Richard Ostertág |
On the usefulness of linear types for correct nonce use enforcement during compile time. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin |
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Marco Macchetti |
A Novel Related Nonce Attack for ECDSA. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
22 | Yao Sun, Shuai Chang |
A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
22 | Shunsuke Osaki, Noboru Kunihiro |
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. |
ICISC (1) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matteo Golinelli, Francesco Bonomi, Bruno Crispo |
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. |
ESORICS Workshops (2) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe |
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Seth Hoffert |
Nonce-encrypting AEAD Modes with Farfalle. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
22 | Donghoon Chang, Deukjo Hong, Jinkeon Kang |
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
22 | Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan |
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
22 | Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu |
Nonce-Misuse Resilience of Romulus-N and GIFT-COFB. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
22 | Jules Baudrin, Anne Canteaut, Léo Perrin |
Practical Cube Attack against Nonce-Misused Ascon. |
IACR Trans. Symmetric Cryptol. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Sho Sugauchi, Satoshi Obana |
Fully Subliminal-Free Schnorr Signature for Nonce. |
CANDAR |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron |
Counter Mode for Long Messages and a Long Nonce. |
CSCML |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Yu Long Chen, Bart Mennink, Bart Preneel |
Categorization of Faulty Nonce Misuse Resistant Message Authentication. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
22 | Khodakhast Bibak, Robert Ritchie 0001 |
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security. |
Quantum Inf. Process. |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yu Long Chen, Bart Mennink, Bart Preneel |
Categorization of Faulty Nonce Misuse Resistant Message Authentication. |
ASIACRYPT (3) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Monjur Alam, Baki Berkay Yilmaz, Frank Werner 0005, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic |
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. |
EuroS&P |
2021 |
DBLP DOI BibTeX RDF |
|
22 | B. Arunkumar 0001, G. Kousalya 0001 |
Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers. |
J. Intell. Fuzzy Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Laura M. Roberts, David Plonka |
Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Na-Young Ahn, Dong Hoon Lee 0001 |
Secure Vehicle Communications Using Proof-of-Nonce Blockchain. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Dat Phuc Tran Song, Byoungjin Seok, Changhoon Lee |
HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. |
Appl. Soft Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Mohit Sahni |
Online Certificate Status Protocol (OCSP) Nonce Extension. |
RFC |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom |
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
22 | Elena Andreeva 0001, Amit Singh Bhati, Damian Vizár |
Nonce-Misuse Security of the SAEF Authenticated Encryption mode. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
22 | Wonseok Choi 0002, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001 |
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi |
BBB Secure Nonce Based MAC Using Public Permutations. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
22 | Wonseok Choi 0002, Akiko Inoue, ByeongHak Lee, Jooyoung Lee 0001, Eik List, Kazuhiko Minematsu, Yusuke Naito 0001 |
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. |
IACR Trans. Symmetric Cryptol. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom |
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. |
CCS |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Elena Andreeva 0001, Amit Singh Bhati, Damian Vizár |
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode. |
SAC |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer |
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. |
USENIX Security Symposium |
2020 |
DBLP BibTeX RDF |
|
22 | Wonseok Choi 0002, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001 |
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs. |
ASIACRYPT (1) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Laura M. Roberts, David Plonka |
Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring. |
TMA |
2020 |
DBLP BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi |
BBB Secure Nonce Based MAC Using Public Permutations. |
AFRICACRYPT |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda |
sfDWCDM+: A BBB secure nonce based MAC. |
Adv. Math. Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi |
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms. |
IEEE Trans. Very Large Scale Integr. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Tairong Shi, Jie Guan |
Real-time state recovery attack against MORUS in nonce-misuse setting. |
Sci. China Inf. Sci. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Burong Kang, Xinyu Meng, Lei Zhang 0009, Yinxia Sun |
Nonce-Based Key Agreement Protocol Against Bad Randomness. |
Int. J. Found. Comput. Sci. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron, Adam Langley, Yehuda Lindell |
AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption. |
RFC |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi, Suprita Talnikar |
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay |
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Patrick Kresmer, Alexander Zeh |
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Mustafa Khairallah |
Forgery Attack on mixFeed in the Nonce-Misuse Scenario. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Joachim Breitner, Nadia Heninger |
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
22 | Joachim Breitner, Nadia Heninger |
Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. |
Financial Cryptography |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Chun Guo 0002, Olivier Pereira, Thomas Peters, François-Xavier Standaert |
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract). |
LATINCRYPT |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi, Suprita Talnikar |
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. |
EUROCRYPT (1) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay |
On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. |
IWASI |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 |
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
22 | Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas |
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
22 | Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam |
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
22 | Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda |
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
22 | Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam |
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. |
CCS |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas |
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. |
SAC |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Serge Vaudenay, Damian Vizár |
Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. |
ACNS |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 |
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda |
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. |
CRYPTO (1) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Sergey Agievich |
EHE: nonce misuse-resistant message authentication. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Shay Gueron, Yehuda Lindell |
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
22 | Wenjie Qin, Kewei Lv |
Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce. |
ATIS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Mathy Vanhoef, Frank Piessens |
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. |
CCS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron, Yehuda Lindell |
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. |
CCS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Xiaojuan Zhang 0003, Dongdai Lin |
Cryptanalysis of Acorn in Nonce-Reuse Setting. |
Inscrypt |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Angelica Buerkin-Pontrelli, Daniel Swingley |
How infants map nonce phrases to scenes with objects and predicates. |
CogSci |
2017 |
DBLP BibTeX RDF |
|
22 | Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo 0001, Ruitong Liu, Liang Liu, Xiaobo Hu |
Practical Partial-Nonce-Exposure Attack on ECC Algorithm. |
CIS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jie Zhang, Yuanliang Meng |
Structure-dependent tone sandhi in real and nonce disyllables in Shanghai Wu. |
J. Phonetics |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Benoît Cogliati, Yannick Seurin |
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
22 | Dhiman Saha, Dipanwita Roy Chowdhury |
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
22 | Jörg Schwenk |
Nonce-based Kerberos is a Secure Delegated AKE Protocol. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
22 | Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic |
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
22 | Mihir Bellare, Björn Tackmann |
Nonce-Based Cryptography: Retaining Security when Randomness Fails. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
22 | Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah Sharaf Alghamdi |
Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification. |
Peer-to-Peer Netw. Appl. |
2016 |
DBLP DOI BibTeX RDF |
|