메뉴 건너뛰기




Volumn 2964, Issue , 2004, Pages 292-304

A parallelizable enciphering mode

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 35048894821     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24660-2_23     Document Type: Article
Times cited : (149)

References (21)
  • 1
    • 84958975323 scopus 로고    scopus 로고
    • Two practical and provably secure block ciphers: BEAR and LION
    • Fast Software Encryption, Third International Workshop
    • R. Anderson and E. Biham. Two practical and provably secure block ciphers: BEAR and LION. In Fast Software Encryption, Third International Workshop, volume 1039 of Lecture Notes in Computer Science, pages 113-120, 1996. www.cs.technion.ac.il/∼biham/.
    • (1996) Lecture Notes in Computer Science , vol.1039 , pp. 113-120
    • Anderson, R.1    Biham, E.2
  • 2
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, 2000. www.cs.ucdavis.edu/∼rogaway.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 3
    • 84947265149 scopus 로고    scopus 로고
    • A block-cipher mode of operation for parallelizable message authentication
    • L. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02, Springer-Verlag
    • J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In L. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02, volume 2332 of Lecture Notes in Computer Science, pages 384-397. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 384-397
    • Black, J.1    Rogaway, P.2
  • 4
    • 84974716098 scopus 로고    scopus 로고
    • A fast large block cipher for disk sector encryption
    • B. Schheier, editor, Fast Software Encryption: 7th International Workshop, Springer-Verlag
    • P. Crowley. Mercy: A fast large block cipher for disk sector encryption. In B. Schheier, editor, Fast Software Encryption: 7th International Workshop, volume 1978 of Lecture Notes in Computer Science, pages 49-63. Springer-Verlag, 2000. www.ciphergoth.org/crypto/mercy.
    • (2000) Lecture Notes in Computer Science , vol.1978 , pp. 49-63
    • Crowley Mercy, P.1
  • 6
    • 35248863065 scopus 로고    scopus 로고
    • A tweakable enciphering mode
    • D. Boneh, editor, Advances in Cryptology - CRYPTO '03, Springer-Verlag, 2003. Full version available on the ePrint archive
    • S. Halevi and P. Rogaway. A tweakable enciphering mode. In D. Boneh, editor, Advances in Cryptology - CRYPTO '03, volume 2729 of Lecture Notes in Computer Science, pages 482-499. Springer-Verlag, 2003. Full version available on the ePrint archive, http://eprint.iacr.org/2003/148/, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 8
    • 35048898251 scopus 로고    scopus 로고
    • Personal communication
    • J. Hughes. Personal communication, 2002.
    • (2002)
    • Hughes, J.1
  • 9
    • 35048846473 scopus 로고    scopus 로고
    • May
    • IEEE. Security in Storage Working Group (SISWG). Sec www.siswg.org and www.mail-archive.com/cryptography@wasabisystems.com/msg02102.html, May 2002.
    • (2002)
  • 10
    • 24944472877 scopus 로고    scopus 로고
    • Cryptanalysis of the EMD mode of operation
    • Advances in Cryptology - EUROCRYPT '03, Springer-Verlag
    • A. Joux. Cryptanalysis of the EMD mode of operation. In Advances in Cryptology - EUROCRYPT '03, volume 2656 of Lecture Notes in Computer Science, pages 1-16. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 1-16
    • Joux, A.1
  • 11
    • 84945137421 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • Advances in Cryptography - EUROCRYPT'01, Springer-Verlag
    • C. Jutla. Encryption modes with almost free message integrity. In Advances in Cryptography - EUROCRYPT'01, volume 2999 of Lecture Notes in Computer Science, pages 529-544. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2999 , pp. 529-544
    • Jutla, C.1
  • 12
    • 0037614498 scopus 로고    scopus 로고
    • How to protect DEIS against exhaustive key search
    • J. Kilian and P. Rogaway. How to protect DEIS against exhaustive key search. Journal of Cryptology, 14(1):17-35, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 13
    • 35048862736 scopus 로고    scopus 로고
    • Earlier version
    • Earlier version in CRYPTO '96. www.cs.ucdavis.edu/∼rogaway.
    • CRYPTO '96
  • 14
    • 84937407660 scopus 로고    scopus 로고
    • Tweakable block ciphers
    • Advances in Cryptology - CRYPTO '02, Springer-Verlag
    • M. Liskov, R. Rivest, and D. Wagner. Tweakable block ciphers. In Advances in Cryptology - CRYPTO '02, volume 2442 of Lecture Notes in Computer Science, pages 31-46. Springer-Verlag, 2002. www.cs.berkeley.edu/∼daw/.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 31-46
    • Liskov, M.1    Rivest, R.2    Wagner, D.3
  • 15
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. of Computation, 17(2), April 1988.
    • (1988) SIAM J. of Computation , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 17
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudo-random permutations: Luby-Rackoff revisited
    • M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. Journal of Cryptology, 12(1):29-66, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 18
    • 35048862271 scopus 로고    scopus 로고
    • Earlier version
    • (Earlier version in STOC '97.) Available from www.wisdom.weizmann.ac.il/∼naor/.
    • STOC '97
  • 20
    • 24944447584 scopus 로고    scopus 로고
    • The hasty pudding cipher
    • AES candidate submitted
    • R. Schroeppel. The hasty pudding cipher. AES candidate submitted to NIST. www.cs.arizona.edu/∼rcs/hpc, 1999.
    • (1999) NIST
    • Schroeppel, R.1
  • 21
    • 85032866581 scopus 로고
    • On the construction of block ciphers provably secure and not relying on any unproved hypotheses
    • Advances in Cryptology - CRYPTO '89, Springer-Verlag
    • Y. Zheng, T. Matsumoto, and H. Imai. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 461-480. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 461-480
    • Zheng, Y.1    Matsumoto, T.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.