-
1
-
-
84958975323
-
Two practical and provably secure block ciphers: BEAR and LION
-
Fast Software Encryption, Third International Workshop
-
R. Anderson and E. Biham. Two practical and provably secure block ciphers: BEAR and LION. In Fast Software Encryption, Third International Workshop, volume 1039 of Lecture Notes in Computer Science, pages 113-120, 1996. www.cs.technion.ac.il/∼biham/.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
, pp. 113-120
-
-
Anderson, R.1
Biham, E.2
-
2
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, 2000. www.cs.ucdavis.edu/∼rogaway.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
3
-
-
84947265149
-
A block-cipher mode of operation for parallelizable message authentication
-
L. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02, Springer-Verlag
-
J. Black and P. Rogaway. A block-cipher mode of operation for parallelizable message authentication. In L. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02, volume 2332 of Lecture Notes in Computer Science, pages 384-397. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 384-397
-
-
Black, J.1
Rogaway, P.2
-
4
-
-
84974716098
-
A fast large block cipher for disk sector encryption
-
B. Schheier, editor, Fast Software Encryption: 7th International Workshop, Springer-Verlag
-
P. Crowley. Mercy: A fast large block cipher for disk sector encryption. In B. Schheier, editor, Fast Software Encryption: 7th International Workshop, volume 1978 of Lecture Notes in Computer Science, pages 49-63. Springer-Verlag, 2000. www.ciphergoth.org/crypto/mercy.
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 49-63
-
-
Crowley Mercy, P.1
-
6
-
-
35248863065
-
A tweakable enciphering mode
-
D. Boneh, editor, Advances in Cryptology - CRYPTO '03, Springer-Verlag, 2003. Full version available on the ePrint archive
-
S. Halevi and P. Rogaway. A tweakable enciphering mode. In D. Boneh, editor, Advances in Cryptology - CRYPTO '03, volume 2729 of Lecture Notes in Computer Science, pages 482-499. Springer-Verlag, 2003. Full version available on the ePrint archive, http://eprint.iacr.org/2003/148/, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
8
-
-
35048898251
-
-
Personal communication
-
J. Hughes. Personal communication, 2002.
-
(2002)
-
-
Hughes, J.1
-
9
-
-
35048846473
-
-
May
-
IEEE. Security in Storage Working Group (SISWG). Sec www.siswg.org and www.mail-archive.com/cryptography@wasabisystems.com/msg02102.html, May 2002.
-
(2002)
-
-
-
10
-
-
24944472877
-
Cryptanalysis of the EMD mode of operation
-
Advances in Cryptology - EUROCRYPT '03, Springer-Verlag
-
A. Joux. Cryptanalysis of the EMD mode of operation. In Advances in Cryptology - EUROCRYPT '03, volume 2656 of Lecture Notes in Computer Science, pages 1-16. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 1-16
-
-
Joux, A.1
-
11
-
-
84945137421
-
Encryption modes with almost free message integrity
-
Advances in Cryptography - EUROCRYPT'01, Springer-Verlag
-
C. Jutla. Encryption modes with almost free message integrity. In Advances in Cryptography - EUROCRYPT'01, volume 2999 of Lecture Notes in Computer Science, pages 529-544. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2999
, pp. 529-544
-
-
Jutla, C.1
-
12
-
-
0037614498
-
How to protect DEIS against exhaustive key search
-
J. Kilian and P. Rogaway. How to protect DEIS against exhaustive key search. Journal of Cryptology, 14(1):17-35, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
13
-
-
35048862736
-
-
Earlier version
-
Earlier version in CRYPTO '96. www.cs.ucdavis.edu/∼rogaway.
-
CRYPTO '96
-
-
-
14
-
-
84937407660
-
Tweakable block ciphers
-
Advances in Cryptology - CRYPTO '02, Springer-Verlag
-
M. Liskov, R. Rivest, and D. Wagner. Tweakable block ciphers. In Advances in Cryptology - CRYPTO '02, volume 2442 of Lecture Notes in Computer Science, pages 31-46. Springer-Verlag, 2002. www.cs.berkeley.edu/∼daw/.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
15
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. of Computation, 17(2), April 1988.
-
(1988)
SIAM J. of Computation
, vol.17
, Issue.2
-
-
Luby, M.1
Rackoff, C.2
-
17
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
M. Naor and O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. Journal of Cryptology, 12(1):29-66, 1999.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
18
-
-
35048862271
-
-
Earlier version
-
(Earlier version in STOC '97.) Available from www.wisdom.weizmann.ac.il/∼naor/.
-
STOC '97
-
-
-
19
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM Press
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 196-205. ACM Press, 2001.
-
(2001)
Eighth ACM Conference on Computer and Communications Security (CCS-8)
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
20
-
-
24944447584
-
The hasty pudding cipher
-
AES candidate submitted
-
R. Schroeppel. The hasty pudding cipher. AES candidate submitted to NIST. www.cs.arizona.edu/∼rcs/hpc, 1999.
-
(1999)
NIST
-
-
Schroeppel, R.1
-
21
-
-
85032866581
-
On the construction of block ciphers provably secure and not relying on any unproved hypotheses
-
Advances in Cryptology - CRYPTO '89, Springer-Verlag
-
Y. Zheng, T. Matsumoto, and H. Imai. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 461-480. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 461-480
-
-
Zheng, Y.1
Matsumoto, T.2
Imai, H.3
|