-
1
-
-
84945121341
-
Does Encryption with Redundancy Provide Authenticity?
-
Springer Verlag
-
J. H. An and M. Bellare. Does Encryption with Redundancy Provide Authenticity? Advances in Cryptology - EUROCRYPT 2001, pp. 512 - 528, Springer Verlag, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
, pp. 512-528
-
-
An, J.H.1
Bellare, M.2
-
3
-
-
85032128552
-
The Security of the Cipher Block Chaining Message Authentication Code
-
M. Bellare, J. Kilian, P. Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences, 61 (3), 362 - 399, 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
4
-
-
0003278940
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Springer-Verlag
-
M. Bellare and C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. Advances in Cryptology - ASIACRYPT 2000, pp. 531-545, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
5
-
-
0001868672
-
Optimal Asymmetric Encryption - How to Encrypt with RSA
-
Springer Verlag
-
M. Bellare and P. Rogaway. Optimal Asymmetric Encryption - How to Encrypt with RSA. Advances in Cryptology - Eurocrypt '94, pp. 92-111, Springer Verlag, 1994.
-
(1994)
Advances in Cryptology - Eurocrypt '94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84937429718
-
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Encryption
-
Springer-Verlag
-
M. Bellare and P. Rogaway. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Encryption. Advances in Cryptology - ASIACRYPT 2000, pp. 317-330, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0004181422
-
-
Contribution to NIST, September
-
J. Daemen and V. Rijmen. AES Proposal: Rijndael. Contribution to NIST, September 1999. Available from csrc.nist.gov/encryption/aes/rijndael/.
-
(1999)
AES Proposal: Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
8
-
-
0018443381
-
Privacy and Authentication: An Introduction to Cryptography
-
W. Diffie and M. Hellman. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE, 67, pp. 397-427, 1979.
-
(1979)
Proceedings of the IEEE
, vol.67
, pp. 397-427
-
-
Diffie, W.1
Hellman, M.2
-
11
-
-
4043055208
-
-
Contribution to the NESSIE project
-
H. Handschuh and D. Naccache. SHACAL. Contribution to the NESSIE project, 2000.
-
(2000)
SHACAL
-
-
Handschuh, H.1
Naccache, D.2
-
17
-
-
84974720881
-
Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation
-
J. Katz and M. Yung. Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation. Fast Software Encryption 2000, pp. 284-299, 2000.
-
(2000)
Fast Software Encryption 2000
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
18
-
-
84880901653
-
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
-
Springer Verlag
-
H. Krawczyk. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Advances in Cryptology - CRYPTO 2001, pp. 310-331, Springer Verlag, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 310-331
-
-
Krawczyk, H.1
-
24
-
-
0004775324
-
CBC MAC for Real-Time Data Sources
-
E. Petrank, C. Rackoff. CBC MAC for Real-Time Data Sources. Journal of Cryptology, 13 (3), pp. 315-338, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 315-338
-
-
Petrank, E.1
Rackoff, C.2
|