Issues
- 0
Acknowledgements
#61 opened by martinthomson - 2
GCM SU IA limit
#55 opened by martinthomson - 4
Provide more examples
#45 opened by thomas-fossati - 6
John Mattsson's analysis
#37 opened by thomas-fossati - 2
Consider situations where AAD is non-negligible in length compared to the plaintext
#16 opened by chris-wood - 0
Include SIV modes
#18 opened by chris-wood - 0
nonce length
#41 opened by jsalowey - 3
Add a reference to RFC 8645
#10 opened by smyshsv - 0
Counting bytes
#35 opened by martinthomson - 1
Produce some example values
#34 opened by martinthomson - 0
Analyses assume perfect primitives
#30 opened by martinthomson - 1
Rename branch to main
#31 opened by martinthomson - 0
Highlight that bounds are derived from different papers with different models
#24 opened by chris-wood - 2
Mattsson feedback
#28 opened by chris-wood - 1
Discuss post-quantum threat model implications
#17 opened by chris-wood - 8
Document different v and q use cases
#4 opened by chris-wood - 0
Clearer explanations of q and v
#22 opened by martinthomson - 0
- 2
- 1
Consider multi-user security implications
#11 opened by chris-wood