-
1
-
-
84957098482
-
Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
An, J., Bellare, M.: Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 252-269. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 252-269
-
-
An, J.1
Bellare, M.2
-
2
-
-
84958975323
-
Two practical and provably secure block ciphers: BEAR and LION
-
Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
-
Anderson, R., Biham, E.: Two practical and provably secure block ciphers: BEAR and LION. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 113-120. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 113-120
-
-
Anderson, R.1
Biham, E.2
-
3
-
-
84957665479
-
-
Bellare, M., Rogaway, P.: On the construction of variable-input-length ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 231-244. Springer, Heidelberg (1999)
-
Bellare, M., Rogaway, P.: On the construction of variable-input-length ciphers. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 231-244. Springer, Heidelberg (1999)
-
-
-
-
4
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography
-
Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 317-330. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84944886613
-
-
Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, 2271, pp. 114-130. Springer, Heidelberg (2002)
-
Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 114-130. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
17444395938
-
On Latin squares. Oxford Cambridge Dublin
-
Cayley, A.: On Latin squares. Oxford Cambridge Dublin Messenger Math. 19, 135-137 (1890)
-
(1890)
Messenger Math
, vol.19
, pp. 135-137
-
-
Cayley, A.1
-
8
-
-
33746720875
-
-
Chakraborty, D., Sarkar, P.: A new mode of encryption providing a strong tweakable pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 293-309. Springer, Heidelberg (2006)
-
Chakraborty, D., Sarkar, P.: A new mode of encryption providing a strong tweakable pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 293-309. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
69849114716
-
HCH: A new tweakable enciphering scheme using the Hash-Encrypt-Hash approach
-
Barua, R, Lange, T, eds, INDOCRYPT 2006, Springer, Heidelberg
-
Chakraborty, D., Sarkar, P.: HCH: A new tweakable enciphering scheme using the Hash-Encrypt-Hash approach. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 287-302. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4329
, pp. 287-302
-
-
Chakraborty, D.1
Sarkar, P.2
-
10
-
-
38349066648
-
Elastic AES
-
Cook, D., Yung, M., Keromytis, A.: Elastic AES. Cryptology ePrint archive, report 2004/141 (2004)
-
(2004)
Cryptology ePrint archive, report
, vol.2004
, Issue.141
-
-
Cook, D.1
Yung, M.2
Keromytis, A.3
-
11
-
-
38349066648
-
Elastic block ciphers
-
Cook, D., Yung, M., Keromytis, A.: Elastic block ciphers. Cryptology ePrint archive, report 2004/128 (2004)
-
(2004)
Cryptology ePrint archive, report
, vol.2004
, Issue.128
-
-
Cook, D.1
Yung, M.2
Keromytis, A.3
-
12
-
-
33646717921
-
EME*: Extending EME to handle arbitrary-length messages with associated data
-
Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
-
Halevi, S.: EME*: Extending EME to handle arbitrary-length messages with associated data. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 315-327. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3348
, pp. 315-327
-
-
Halevi, S.1
-
14
-
-
35048894821
-
-
Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 292-304. Springer, Heidelberg (2004)
-
Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 292-304. Springer, Heidelberg (2004)
-
-
-
-
15
-
-
35248863065
-
A tweakable enciphering mode
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482-499. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
16
-
-
84937407660
-
-
Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, 2442, pp. 31-46. Springer, Heidelberg (2002)
-
Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31-46. Springer, Heidelberg (2002)
-
-
-
-
17
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing 17(2), 373-386 (1988)
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
18
-
-
38349063731
-
-
Lucks, S.: BEAST: A fast block cipher for arbitrary blocksizes. In: Communications and Multimedia Security, IFIP, 70, pp. 144-153. Chapman & Hill, Sydney, Australia (1996)
-
Lucks, S.: BEAST: A fast block cipher for arbitrary blocksizes. In: Communications and Multimedia Security, IFIP, vol. 70, pp. 144-153. Chapman & Hill, Sydney, Australia (1996)
-
-
-
-
19
-
-
51849100070
-
-
Lucks, S.: Faster Luby-Rackoff ciphers. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, 1039, pp. 189-203. Springer, Heidelberg (1996)
-
Lucks, S.: Faster Luby-Rackoff ciphers. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 189-203. Springer, Heidelberg (1996)
-
-
-
-
22
-
-
0003064824
-
On the construction of pseudorandom permutations: Luby-Rackoff revisited
-
Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of Cryptology 12(1), 29-66 (1999)
-
(1999)
Journal of Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
23
-
-
85034496745
-
How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Patarin, J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 256-266. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 256-266
-
-
Patarin, J.1
-
24
-
-
33745569797
-
-
Patel, S., Ramzan, Z., Sundaram, G.: Efficient constructions of variable-input-length block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, pp. 326-340. Springer, Heidelberg (2004)
-
Patel, S., Ramzan, Z., Sundaram, G.: Efficient constructions of variable-input-length block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 326-340. Springer, Heidelberg (2004)
-
-
-
-
25
-
-
38349079254
-
-
Ristenpart, T., Rogaway, P.: How to enrich the Message Space of a Cipher (full version of this paper), http://www.cse.ucsd.edu/users/tristenp/
-
Ristenpart, T., Rogaway, P.: How to enrich the Message Space of a Cipher (full version of this paper), http://www.cse.ucsd.edu/users/tristenp/
-
-
-
-
26
-
-
84958955327
-
Unbalanced Feistel networks and block cipher design
-
Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
-
Schneier, B., Kelsey, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 121-144. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 121-144
-
-
Schneier, B.1
Kelsey, J.2
-
27
-
-
0012099837
-
Black box cryptanalysis of hash networks based on multipermutations
-
De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
-
Schnorr, C., Vaudenay, S.: Black box cryptanalysis of hash networks based on multipermutations. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 47-57. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 47-57
-
-
Schnorr, C.1
Vaudenay, S.2
-
29
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
Preneel, B, ed, Fast Software Encryption, Springer, Heidelberg
-
Vaudenay, S.: On the need for multipermutations: cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) Fast Software Encryption. LNCS, vol. 1008, pp. 286-297. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
30
-
-
33744898820
-
-
Wang, P., Feng, D., Wu, W.: HCTR: a variable-input-length enciphering mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, 3822, pp. 175-188. Springer, Heidelberg (2005)
-
Wang, P., Feng, D., Wu, W.: HCTR: a variable-input-length enciphering mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 175-188. Springer, Heidelberg (2005)
-
-
-
-
31
-
-
85032866581
-
On the construction of block ciphers provably secure and not relying on any unproved hypotheses
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 461-480. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 461-480
-
-
Zheng, Y.1
Matsumoto, T.2
Imai, H.3
|