메뉴 건너뛰기




Volumn 3348, Issue , 2004, Pages 343-355

The security and performance of the galois/counter mode (GCM) of operation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY; AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 33845303377     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30556-9_27     Document Type: Article
Times cited : (308)

References (26)
  • 3
    • 85024585723 scopus 로고
    • Incremental cryptography: The case of hashing and signing
    • CRYPTO '94, Springer-Verlag, Aug.
    • M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental cryptography: the case of hashing and signing", CRYPTO '94, LNCS, Springer-Verlag, Aug. 1994.
    • (1994) LNCS
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 4
    • 85032128552 scopus 로고    scopus 로고
    • The Security of the Cipher Block Chaining Message Authentication Code
    • pg.
    • M. Bellare, J. Kilian, P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code," J. Comput. Syst. Sci. 61(3). pg. 362-399 (2000).
    • (2000) J. Comput. Syst. Sci. , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 5
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • ASIACRYPT '00, Springer-Verlag
    • M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm," ASIACRYPT '00, Springer-Verlag, LNCS, 2000.
    • (2000) LNCS
    • Bellare, M.1    Namprempre, C.2
  • 6
    • 78650921179 scopus 로고    scopus 로고
    • Floating-point arithmetic and message authentication
    • Available online at
    • D. Bernstein. Floating-point arithmetic and message authentication, Manuscript, 2000. Available online at http://cr.yp.to/papers.html#hash127.
    • (2000) Manuscript
    • Bernstein, D.1
  • 7
    • 84947265149 scopus 로고    scopus 로고
    • A Block-Cipher Mode of Operation for Parallelizable Message Authentication
    • EUROCRYPT '02, Springer-Verlag
    • J. Black and P. Rogaway, "A Block-Cipher Mode of Operation for Parallelizable Message Authentication," EUROCRYPT '02, LNCS, Springer-Verlag, 2002.
    • (2002) LNCS
    • Black, J.1    Rogaway, P.2
  • 9
    • 0003309048 scopus 로고    scopus 로고
    • The nature of the beast: Recent traffic measurements from an Internet backbone
    • ISOC
    • K. Claffy, G. Miller, K. Thompson, "The nature of the beast: recent traffic measurements from an Internet backbone," INET '98, ISOC, 1998.
    • (1998) INET '98
    • Claffy, K.1    Miller, G.2    Thompson, K.3
  • 13
    • 0004103610 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • Springer-Verlag
    • C. Jutla, "Encryption modes with almost free message integrity," Advanced in Cryptology - EUROCRYPT '01, Springer-Verlag, 2001.
    • (2001) Advanced in Cryptology - EUROCRYPT '01
    • Jutla, C.1
  • 16
    • 0012048989 scopus 로고
    • LFSR-based hashing and authentication
    • Y. Desmedt, editor, LNCS, Springer-Verlag, Aug.
    • H. Krawczyk, "LFSR-based hashing and authentication," In Y. Desmedt, editor, CRYPTO '94, LNCS, Springer-Verlag, Aug. 1994.
    • (1994) CRYPTO '94
    • Krawczyk, H.1
  • 17
    • 35048847652 scopus 로고    scopus 로고
    • The Universal Security Transform
    • Work in Progress. Oct.
    • D. McGrew. "The Universal Security Transform," IETF Internet Draft, Work in Progress. Oct. 2002.
    • (2002) IETF Internet Draft
    • McGrew, D.1
  • 19
    • 0037673324 scopus 로고    scopus 로고
    • Authenticated encryption with associated data
    • Nov.
    • P. Rogaway. "Authenticated encryption with associated data," In Proceedings of the 9th CCS, Nov. 2002.
    • (2002) Proceedings of the 9th CCS
    • Rogaway, P.1
  • 20
    • 0035750947 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • P. Rogaway, M. Bellare, J. Black, and T. Krovetz, "OCB: a block-cipher mode of operation for efficient authenticated encryption," ACM CCS, 2001.
    • (2001) ACM CCS
    • Rogaway, P.1    Bellare, M.2    Black, J.3    Krovetz, T.4
  • 21
    • 85029800826 scopus 로고    scopus 로고
    • Media Access Control (MAC) Security
    • A. Romanow, Ed. Draft Standard, July
    • A. Romanow, Ed. "Media Access Control (MAC) Security", IEEE 802.1AE, Draft Standard, July, 2004.
    • (2004) IEEE 802.1AE
  • 22
    • 0003239571 scopus 로고    scopus 로고
    • On Fast and Provably Secure Message Authentication Based on Universal Hashing
    • LNCS, Springer-Verlag
    • V. Shoup, "On Fast and Provably Secure Message Authentication Based on Universal Hashing," CRYPTO '96, LNCS, Springer-Verlag, 1996.
    • (1996) CRYPTO '96
    • Shoup, V.1
  • 23
    • 0003508558 scopus 로고    scopus 로고
    • The Advanced Encryption Standard
    • U.S. National Institute of Standards and Technology. The Advanced Encryption Standard. Federal Information Processing Standard (FIPS) 197, 2002.
    • (2002) Federal Information Processing Standard (FIPS) , vol.197
  • 24
    • 35048818105 scopus 로고    scopus 로고
    • The Use of Galois/Counter Mode (GCM) in IPsec ESP
    • Work in Progress, April
    • J. Viega and D. McGrew, "The Use of Galois/Counter Mode (GCM) in IPsec ESP," IETF Internet Draft, Work in Progress, April, 2004.
    • (2004) IETF Internet Draft
    • Viega, J.1    McGrew, D.2
  • 25
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and L. Carter, "New hash functions and their use in authentication and set equality," Journal of Computer and System Sciences, 22:265279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265279
    • Wegman, M.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.