Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
22
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,507
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2014
Security of Symmetric Encryption against Mass Surveillance
other
Author(s):
Mihir Bellare
,
Kenneth G. Paterson
,
Phillip Rogaway
Publication date
(Print):
2014
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
22
Record
: found
Abstract
: not found
Book Chapter
: not found
The Prisoners’ Problem and the Subliminal Channel
Gustavus Simmons
(1984)
0
comments
Cited
71
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Reflections on trusting trust
Ken Thompson
(1984)
0
comments
Cited
35
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Tweakable Enciphering Mode
Shai Halevi
,
Phillip Rogaway
(2003)
0
comments
Cited
29
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 1-19
DOI:
10.1007/978-3-662-44371-2_1
SO-VID:
5fc7a0c8-b85a-4119-b3a2-03ad68439c67
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Security of Symmetric Encryption against Mass Surveillance
pp. 39
Minimizing the Two-Round Even-Mansour Cipher
pp. 57
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
pp. 188
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
pp. 297
Faster Bootstrapping with Polynomial Error
pp. 335
Improved Short Lattice Signatures in the Standard Model
pp. 371
Homomorphic Signatures with Efficient Verification for Polynomial Functions
pp. 408
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
pp. 426
Witness Encryption from Instance Independent Assumptions
pp. 444
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
pp. 480
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
pp. 500
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
pp. 518
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
pp. 536
Maliciously Circuit-Private FHE
pp. 554
Algorithms in HElib
Similar content
2,507
Origami–Kirigami Arts: Achieving Circular Dichroism by Flexible Meta‐Film for Electromagnetic Information Encryption
Authors:
He Wang
,
Zhe Qin
,
Hongqiang Zhou
…
“Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication.”
Authors:
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
Authors:
Manjari Singh Rathore
,
M. Poongodi
,
Praneet Saurabh
…
See all similar
Cited by
22
Cryptographic Reverse Firewalls
Authors:
Ilya Mironov
,
Noah Stephens-Davidowitz
Security of Symmetric Encryption against Mass Surveillance
Authors:
Mihir Bellare
,
Kenneth G. Paterson
,
Phillip Rogaway
A Formal Treatment of Backdoored Pseudorandom Generators
Authors:
Yevgeniy Dodis
,
Chaya Ganesh
,
Alexander Golovnev
…
See all cited by