메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 482-499

A tweakable enciphering mode

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 35248863065     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_28     Document Type: Article
Times cited : (176)

References (21)
  • 3
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 232-249. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 232-249
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 7
    • 84974716098 scopus 로고    scopus 로고
    • Mercy: A fast large block cipher for disk sector encryption
    • B. Schneier,-editor, Fast Software Encryption: 7th International Workshop, New York, USA, Apr. Springer-Verlag
    • P. Crowley. Mercy: A fast large block cipher for disk sector encryption. In B. Schneier,-editor, Fast Software Encryption: 7th International Workshop, volume 1978 of Lecture Notes in Computer Science, pages 49-63, New York, USA, Apr. 2000. Springer-Verlag, www.ciphergoth.org/crypto/mercy.
    • (2000) Lecture Notes in Computer Science , vol.1978 , pp. 49-63
    • Crowley, P.1
  • 8
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • Earlier version in STOC 91
    • D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000. Earlier version in STOC 91.
    • (2000) SIAM Journal on Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 11
    • 35248852905 scopus 로고    scopus 로고
    • Working group homepage at Call for algorithms can be found at www.mail-archive.eom/cryptography@wasabisystems.com/msg02102.html, May
    • J. Hughes. Chair of the IEEE Security in Storage Working Group. Working group homepage at www.siswg.org. Call for algorithms can be found at www.mail-archive.eom/cryptography@wasabisystems.com/msg02102.html, May 2002.
    • (2002)
    • Hughes, J.1
  • 12
    • 24944472877 scopus 로고    scopus 로고
    • Cryptanalysis of the EMD mode of operation
    • Advances in Cryptology - EUROCRYPT '03, Springer-Verlag
    • A. Joux. Cryptanalysis of the EMD mode of operation. In Advances in Cryptology - EUROCRYPT '03, volume 2656 of Lecture Notes in Computer Science. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656
    • Joux, A.1
  • 15
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. of Computation, 17(2), April 1988.
    • (1988) SIAM J. of Computation , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 19
    • 24944526441 scopus 로고    scopus 로고
    • The EMD mode of operation (a tweaked, wide-blocksize, strong PRP)
    • Report 2002/148, Oct. Early (buggy) version of the CMC algorithm
    • P. Rogaway. The EMD mode of operation (a tweaked, wide-blocksize, strong PRP). Cryptology ePrint Archive, Report 2002/148, Oct. 2002. Early (buggy) version of the CMC algorithm. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive
    • Rogaway, P.1
  • 21
    • 85032866581 scopus 로고
    • On the construction of block ciphers provably secure and not relying on any unproved hypotheses
    • Advances in Cryptology - CRYPTO '89, Springer-Verlag
    • Y. Zheng, T. Matsumoto, and H. Imai. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 461-480. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 461-480
    • Zheng, Y.1    Matsumoto, T.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.