-
2
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication
-
L. Knudsen, editor, Springer-Verlag
-
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In L. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02, volume 2332 of Lecture Notes in Computer Science, pages 384-397. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - EUROCRYPT '02, Volume 2332 of Lecture Notes in Computer Science
, vol.2332
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
3
-
-
84944886613
-
Ciphers with arbitrary finite domains
-
Springer-Verlag
-
J. Black and P. Rogaway. Ciphers with arbitrary finite domains. In The RSA conference - Cryptographer's track, RSA-CT'02, volume 2271 of Lecture Notes in Computer Science, pages 114-130. Springer-Verlag, 2002.
-
(2002)
The RSA Conference - Cryptographer's Track, RSA-CT'02, Volume 2271 of Lecture Notes in Computer Science
, vol.2271
, pp. 114-130
-
-
Black, J.1
Rogaway, P.2
-
4
-
-
35048838479
-
-
Web document. Available at
-
S. Duplichan. A primitive polynomial search program. Web document. Available at http://users2.ev1.net/~sduplichan/primitivepolynomials/ primivitePolynomials.htm, 2003.
-
(2003)
A Primitive Polynomial Search Program
-
-
Duplichan, S.1
-
5
-
-
1942530977
-
A construction of a cipher from a single pseudorandom permutation
-
S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. Journal of Cryptology, 10(3):151-162, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 151-162
-
-
Even, S.1
Mansour, Y.2
-
7
-
-
35248863065
-
A tweakable enciphering mode
-
D. Boneh, editor, Springer-Verlag, Full version available on the ePrint archive
-
S. Halevi and P. Rogaway. A tweakable enciphering mode. In D. Boneh, editor, Advances in Cryptology - CRYPTO '03, volume 2729 of Lecture Notes in Computer Science, pages 482-499. Springer-Verlag, 2003. Full version available on the ePrint archive, http://eprint.iacr.org/2003/148/.
-
(2003)
Advances in Cryptology - CRYPTO '03, Volume 2729 of Lecture Notes in Computer Science
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
8
-
-
35048894821
-
A parallelizable enciphering mode
-
Springer-Velrag, Full version available on the ePrint archive
-
S. Halevi and P. Rogaway. A parallelizable enciphering mode. In The RSA conference - Cryptographer's track, RSA-CT'04, volume 2964 of Lecture Notes in Computer Science, pages 292-304. Springer-Velrag, 2004. Full version available on the ePrint archive, http://eprint.iacr.org/2003/147/.
-
(2004)
The RSA Conference - Cryptographer's Track, RSA-CT'04, Volume 2964 of Lecture Notes in Computer Science
, vol.2964
, pp. 292-304
-
-
Halevi, S.1
Rogaway, P.2
-
9
-
-
35048863559
-
EME*: Extending EME to handle arbitrary-length messages with associated data
-
Full version available on the ePrint archive
-
S. Halevi. EME*: extending EME to handle arbitrary-length messages with associated data. In Indocrypt 2004. Full version available on the ePrint archive, http://eprint.iacr.org/2004/125/.
-
Indocrypt 2004
-
-
Halevi, S.1
-
10
-
-
0037614498
-
How to protect des against exhaustive key search
-
Earlier version in CRYPTO '96. www.cs.ucdavis.edu/~rogaway.
-
J. Kilian and P. Rogaway. How to protect DES against exhaustive key search. Journal of Cryptology, 14(1):17-35, 2001. Earlier version in CRYPTO '96. www.cs.ucdavis.edu/~rogaway.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
11
-
-
84937407660
-
Tweakable block ciphers
-
Springer-Verlag, www.cs.berkeley.edu/~daw/.
-
M. Liskov, R. Rivest, and D. Wagner. Tweakable block ciphers. In Advances in Cryptology - CRYPTO '02, volume 2442 of Lecture Notes in Computer Science, pages 31-46. Springer-Verlag, 2002. www.cs.berkeley.edu/~daw/.
-
(2002)
Advances in Cryptology - CRYPTO '02, Volume 2442 of Lecture Notes in Computer Science
, vol.2442
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
12
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2), April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
14
-
-
35048832999
-
A pseudo-random encryption mode
-
available from www.wisdom.weizmann.ac.il/~naor
-
M. Naor and O. Reingold. A pseudo-random encryption mode. Manuscript, available from www.wisdom.weizmann.ac.il/~naor/.
-
Manuscript
-
-
Naor, M.1
Reingold, O.2
-
15
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
Earlier version in STOC '97. Available from www.wisdom.weizmann.ac.il/ ~naor
-
M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. Journal of Cryptology, 12(1):29-66, 1999. (Earlier version in STOC '97.) Available from www.wisdom.weizmann.ac.il/~naor/.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
17
-
-
33745569797
-
Efficient Constructions of Variable-Input-Length Block Ciphers
-
Selected Areas in Cryptography - SAC 2004, Springer-Verlag
-
S. Patel, Z. Ramzan and G .Sundaram. Efficient Constructions of Variable-Input-Length Block Ciphers. In Selected Areas in Cryptography - SAC 2004, volume 3xxx of Lecture Notes in Computer Science, pages yyy-zzz. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3
-
-
Patel, S.1
Ramzan, Z.2
Sundaram, G.3
|