-
1
-
-
84957665479
-
On the construction of variable-input-length ciphers
-
L. Knudsen, editor, Fast Software Encryption 1999, Springer-Verlag
-
M. Bellare and P. Rogaway. On the construction of variable-input-length ciphers. In L. Knudsen, editor, Fast Software Encryption 1999, volume 1636 of LNCS, pages 231-244. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1636
, pp. 231-244
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication
-
L. R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
-
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In L. R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 384-397. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
5
-
-
84974716098
-
Mercy: A fast large block cipher for disk sector encryption
-
B. Schneier, editor, Fast Software Encryption 2000, Springer-Verlag
-
P. Crowley. Mercy: A fast large block cipher for disk sector encryption. In B. Schneier, editor, Fast Software Encryption 2000, volume 1978 of LNCS, pages 49-63. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1978
, pp. 49-63
-
-
Crowley, P.1
-
6
-
-
0003508558
-
-
FIPS-197. Federal information processing standards publication (FIPS 197)
-
FIPS-197. Federal information processing standards publication (FIPS 197). Advanced Encryption Standard (AES), 2001. http://csrc.nist. gov/publications/fips/fips197/fips-197.pdf.
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
7
-
-
84958953005
-
Cryptanalysis of the Mercy block cipher
-
M. Matsui, editor, Fast Software Encryption 2001, Springer-Verlag
-
S. R. Fluhrer. Cryptanalysis of the Mercy block cipher. In M. Matsui, editor, Fast Software Encryption 2001, volume 2355 of LNCS, pages 28-36. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2355
, pp. 28-36
-
-
Fluhrer, S.R.1
-
8
-
-
35248863065
-
A tweakable enciphering mode
-
D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, Springer-Verlag
-
S. Halevi and P. Rogaway. A tweakable enciphering mode. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 482-499. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
9
-
-
35048894821
-
A parallelizable enciphering mode
-
T. Okamoto, editor, The Cryptographers' Track at RSA Conference - CT-RSA 2004, Springer-Verlag
-
S. Halevi and P, Rogaway. A parallelizable enciphering mode, In T. Okamoto, editor, The Cryptographers' Track at RSA Conference - CT-RSA 2004, volume 2964 of LNCS. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2964
-
-
Halevi, S.1
Rogaway, P.2
-
10
-
-
84955573096
-
How to protect des against exhaustive key search
-
N. Koblitz, editor, Advances in Cryptology - CRYPTO 1996, Springer-Verlag
-
J. Kilian and P. Rogaway. How to protect DES against exhaustive key search. In N. Koblitz, editor, Advances in Cryptology - CRYPTO 1996, volume 1109 of LNCS, pages 252-267. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 252-267
-
-
Kilian, J.1
Rogaway, P.2
-
11
-
-
84937407660
-
Tweakable block ciphers
-
M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
M. Liskov, R. L. Rivest, and D. Wagner. Tweakable block ciphers. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of LNCS, pages 31-46. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.L.2
Wagner, D.3
-
12
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Special issue on cryptography
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988. Special issue on cryptography.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
13
-
-
38149029616
-
The extended codebook (XCB) mode of operation
-
D. A. McGrew and S. R. Fluhrer. The extended codebook (XCB) mode of operation. Cryptology ePrint Archive, Report 2004/278, 2004. http:// eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.278
-
-
McGrew, D.A.1
Fluhrer, S.R.2
-
14
-
-
33845303377
-
The security and performance of the galois/counter mode (GCM) of operation
-
A. Canteaut and K. Viswanathan, editors, Advances in Cryptology - INDOCRYPT 2004, Springer-Verlag
-
D. A. McGrew and J. Viega. The security and performance of the galois/counter mode (GCM) of operation. In A. Canteaut and K. Viswanathan, editors, Advances in Cryptology - INDOCRYPT 2004, volume 3348 of LNCS, pages 343-355. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.3348
, pp. 343-355
-
-
McGrew, D.A.1
Viega, J.2
-
20
-
-
84957673485
-
Towards making Luby-Rackoff ciphers optimal and practical
-
L. Knudsen, editor, Fast software encryption 1999, Springer-Verlag
-
S. Patel, Z. Ramzan, and G. S. Sundaram. Towards making Luby-Rackoff ciphers optimal and practical. In L. Knudsen, editor, Fast software encryption 1999, volume 1636 of LNCS, pages 171-185. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1636
, pp. 171-185
-
-
Patel, S.1
Ramzan, Z.2
Sundaram, G.S.3
-
21
-
-
33745569797
-
Efficient constructions of variable-input-length block ciphers
-
H. Handschuh and M. A. Kasan, editors, Selected Areas in Cryptography 8004, Springer-Verlag
-
S. Patel, Z. Ramzan, and G. S. Sundaram. Efficient constructions of variable-input-length block ciphers. In H. Handschuh and M. A. Kasan, editors, Selected Areas in Cryptography 8004, volume 3357 of LNCS, pages 326-340. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3357
, pp. 326-340
-
-
Patel, S.1
Ramzan, Z.2
Sundaram, G.S.3
-
22
-
-
33644958567
-
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
-
P. J. Lee, editor, Advances in Cryptology - ASI-ACRYPT 2004, Springer-Verlag
-
P. Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In P. J. Lee, editor, Advances in Cryptology - ASI-ACRYPT 2004, volume 3329 of LNCS, pages 16-31. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 16-31
-
-
Rogaway, P.1
-
23
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryptiona
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: a block-cipher mode of operation for efficient authenticated encryptiona. In Proceedings of the 8th ACM Conference on Computer and Communications Security, pages 196-205, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
25
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
N. Koblitz, editor, Advances in Cryptology - CRYPTO 1996, Springer-Verlag
-
V. Shoup. On fast and provably secure message authentication based on universal hashing. In N. Koblitz, editor, Advances in Cryptology - CRYPTO 1996, volume 1109 of LNCS, pages 313-328. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 313-328
-
-
Shoup, V.1
-
26
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.332
-
-
Shoup, V.1
|