메뉴 건너뛰기




Volumn 3348, Issue , 2004, Pages 315-327

EME*: Extending EME to handle arbitrary-length messages with associated data

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 33646717921     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30556-9_25     Document Type: Article
Times cited : (72)

References (19)
  • 4
    • 35048838479 scopus 로고    scopus 로고
    • Web document. Available at
    • S. Duplichan. A primitive polynomial search program. Web document. Available at http://users2.ev1.net/~sduplichan/primitivepolynomials/ primivitePolynomials.htm, 2003.
    • (2003) A Primitive Polynomial Search Program
    • Duplichan, S.1
  • 5
    • 1942530977 scopus 로고    scopus 로고
    • A construction of a cipher from a single pseudorandom permutation
    • S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. Journal of Cryptology, 10(3):151-162, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.3 , pp. 151-162
    • Even, S.1    Mansour, Y.2
  • 7
    • 35248863065 scopus 로고    scopus 로고
    • A tweakable enciphering mode
    • D. Boneh, editor, Springer-Verlag, Full version available on the ePrint archive
    • S. Halevi and P. Rogaway. A tweakable enciphering mode. In D. Boneh, editor, Advances in Cryptology - CRYPTO '03, volume 2729 of Lecture Notes in Computer Science, pages 482-499. Springer-Verlag, 2003. Full version available on the ePrint archive, http://eprint.iacr.org/2003/148/.
    • (2003) Advances in Cryptology - CRYPTO '03, Volume 2729 of Lecture Notes in Computer Science , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 9
    • 35048863559 scopus 로고    scopus 로고
    • EME*: Extending EME to handle arbitrary-length messages with associated data
    • Full version available on the ePrint archive
    • S. Halevi. EME*: extending EME to handle arbitrary-length messages with associated data. In Indocrypt 2004. Full version available on the ePrint archive, http://eprint.iacr.org/2004/125/.
    • Indocrypt 2004
    • Halevi, S.1
  • 10
    • 0037614498 scopus 로고    scopus 로고
    • How to protect des against exhaustive key search
    • Earlier version in CRYPTO '96. www.cs.ucdavis.edu/~rogaway.
    • J. Kilian and P. Rogaway. How to protect DES against exhaustive key search. Journal of Cryptology, 14(1):17-35, 2001. Earlier version in CRYPTO '96. www.cs.ucdavis.edu/~rogaway.
    • (2001) Journal of Cryptology , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 12
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2), April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 14
    • 35048832999 scopus 로고    scopus 로고
    • A pseudo-random encryption mode
    • available from www.wisdom.weizmann.ac.il/~naor
    • M. Naor and O. Reingold. A pseudo-random encryption mode. Manuscript, available from www.wisdom.weizmann.ac.il/~naor/.
    • Manuscript
    • Naor, M.1    Reingold, O.2
  • 15
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudo-random permutations: Luby-Rackoff revisited
    • Earlier version in STOC '97. Available from www.wisdom.weizmann.ac.il/ ~naor
    • M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. Journal of Cryptology, 12(1):29-66, 1999. (Earlier version in STOC '97.) Available from www.wisdom.weizmann.ac.il/~naor/.
    • (1999) Journal of Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 17
    • 33745569797 scopus 로고    scopus 로고
    • Efficient Constructions of Variable-Input-Length Block Ciphers
    • Selected Areas in Cryptography - SAC 2004, Springer-Verlag
    • S. Patel, Z. Ramzan and G .Sundaram. Efficient Constructions of Variable-Input-Length Block Ciphers. In Selected Areas in Cryptography - SAC 2004, volume 3xxx of Lecture Notes in Computer Science, pages yyy-zzz. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3
    • Patel, S.1    Ramzan, Z.2    Sundaram, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.