-
1
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362-399 (2000)
-
(2000)
J. Comput. Syst. Sci
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
51849140875
-
Key-recovery attacks on universal hash function based MAC algorithms
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Handschuh, H., Preneel, B.: Key-recovery attacks on universal hash function based MAC algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 144-161. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 144-161
-
-
Handschuh, H.1
Preneel, B.2
-
5
-
-
0242656059
-
-
Iwata, T., Kurosawa, K.: OMAC.: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 129-153. Springer, Heidelberg (2003)
-
Iwata, T., Kurosawa, K.: OMAC.: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129-153. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373-386 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
7
-
-
84948969374
-
The sum of PRPs is a secure PRF
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Lucks, S.: The sum of PRPs is a secure PRF. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 470-484. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 470-484
-
-
Lucks, S.1
-
8
-
-
33646776051
-
A failure-friendly design principle for hash functions
-
Roy, B.K, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Lucks, S.: A failure-friendly design principle for hash functions. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 474-494
-
-
Lucks, S.1
-
9
-
-
33845303377
-
The security and performance of the Galois/counter mode (GCM) of operation
-
Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
-
McGrew, D.A., Viega, J.: The security and performance of the Galois/counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343-355. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3348
, pp. 343-355
-
-
McGrew, D.A.1
Viega, J.2
-
12
-
-
35048880937
-
Security of random Feistel schemes with 5 or more rounds
-
Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
-
Patarin, J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 106-122. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 106-122
-
-
Patarin, J.1
-
13
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM Press, New York
-
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: ACM CCS, pp. 196-205. ACM Press, New York (2001)
-
(2001)
ACM CCS
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
14
-
-
0037673324
-
Authenticated-encryption with associated-data
-
Atluri, V, ed, ACM Press, New York
-
Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) ACM CCS, pp. 98-107. ACM Press, New York (2002)
-
(2002)
ACM CCS
, pp. 98-107
-
-
Rogaway, P.1
-
15
-
-
35048855085
-
-
Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 348-359. Springer, Heidelberg (2004)
-
Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004)
-
-
-
-
16
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
-
17
-
-
34547285694
-
High-speed hardware architectures for authenticated encryption mode GCM
-
Friedman, E.G, Theodoridis, S, eds, IEEE Press, Los Alamitos
-
Satoh, A.: High-speed hardware architectures for authenticated encryption mode GCM. In: Friedman, E.G., Theodoridis, S. (eds.) IEEE ISCAS 2006, pp. 4831-4844. IEEE Press, Los Alamitos (2006)
-
(2006)
IEEE ISCAS
, pp. 4831-4844
-
-
Satoh, A.1
-
18
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265-279 (1981)
-
(1981)
J. Comput. Syst. Sci
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, L.2
-
19
-
-
33745815178
-
Counter with CBC-MAC (CCM)
-
html
-
Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). Submission to NIST (2002), http://csrcnist.gov/groups/ST/toolkit/BCH/index, html
-
(2002)
Submission to NIST
-
-
Whiting, D.1
Housley, R.2
Ferguson, N.3
|