Parliamentary standards under attack: an interdisciplinary approach to understanding the Westminster Parliament. [PDF]
Crewe E.
europepmc +1 more source
Development and preliminary validation of the Meat Consumption Scale. [PDF]
Camilleri L, Jago A, Rehman A, Gill PR.
europepmc +1 more source
The Infant and Toddler Curiosity Questionnaire: A Validated Caregiver-Report Measure of Curiosity in Children From 5 to 24 Months. [PDF]
Altmann EC +3 more
europepmc +1 more source
Implementation of National Nutrition Policies and Strategies to Reduce Unhealthy Diets: An Ecological Analysis of 194 Countries from 2017 to 2021. [PDF]
Forray AI, Borzan CM.
europepmc +1 more source
Affecting photos: Photographs as shared, affective ethnographic spaces. [PDF]
Rowsell J.
europepmc +1 more source
Related searches:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting
Lecture Notes in Computer Science, 2021Double-block Hash-then-Sum (DbHtS) MACs are a class of MACs that aim for achieving beyond-birthday-bound security, including SUM-ECBC, PMAC_Plus, 3kf9 and LightMAC_Plus. Recently Datta et al. (FSE’19), and then Kim et al. (Eurocrypt’20) prove that DbHtS constructions are secure beyond the birthday bound in the single-user setting. However, by a generic
Yaobin Shen +3 more
openaire +3 more sources
POEx: A beyond-birthday-bound-secure on-line cipher
Cryptography and Communications, 2017On-line ciphers are convenient building blocks for realizing efficient single- pass encryption. In particular, the trend to limit the consequences of nonce reuses rendered them popular in recent authenticated encryption schemes. While encryption schemes, such as POE, COPE, or the ciphers within ElmE/ElmD concentrated on efficiency, their security ...
Christian Forler +3 more
openaire +1 more source
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
2019Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE). Unfortunately, almost all designs following the EtM paradigm, including the AE suites for TLS, are vulnerable against nonce misuse. A single repetition of the nonce value reveals the hash key, leading to a universal forgery attack.
Avijit Dutta +2 more
openaire +1 more source

