How to Abuse and Fix Authenticated Encryption Without Key Commitment

  • Ange Albertini
  • , Thai Duong
  • , Shay Gueron
  • , Stefan Kölbl
  • , Atul Luykx
  • , Sophie Schmieg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Fingerprint

Dive into the research topics of 'How to Abuse and Fix Authenticated Encryption Without Key Commitment'. Together they form a unique fingerprint.

Keyphrases

Computer Science