-
1
-
-
84937407719
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
2
-
-
84857770238
-
Duplexing the Sponge: Authenticated Encryption and Other Applications
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the Sponge: Authenticated Encryption and Other Applications. In: The Second SHA-3 Candidate Conference (2010)
-
The Second SHA-3 Candidate Conference (2010)
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
3
-
-
38149053610
-
The Design of a Stream Cipher LEX
-
Biham, E., Youssef, A.M. (eds.) SAC 2006. Springer, Heidelberg
-
Biryukov, A.: The Design of a Stream Cipher LEX. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 67-75. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4356
, pp. 67-75
-
-
Biryukov, A.1
-
4
-
-
26444575926
-
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC
-
Gilbert, H., Handschuh, H. (eds.) FSE 2005. Springer, Heidelberg
-
Daemen, J., Rijmen, V.: A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 1-17. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3557
, pp. 1-17
-
-
Daemen, J.1
Rijmen, V.2
-
6
-
-
58349115749
-
A New Attack on the LEX Stream Cipher
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Dunkelman, O., Keller, N.: A New Attack on the LEX Stream Cipher. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 539-556. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 539-556
-
-
Dunkelman, O.1
Keller, N.2
-
7
-
-
0242571721
-
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
-
Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
-
Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330-346. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 330-346
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
-
8
-
-
84965066515
-
Advanced Encryption Standard (AES)
-
November 26
-
Advanced Encryption Standard (AES), FIPS Publication 197 (November 26, 2001), http://csrc.nist.gov/encryption/aes
-
(2001)
FIPS Publication 197
-
-
-
9
-
-
84857759913
-
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
-
Presented at the
-
Gligor, V., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. Presented at the 2nd NIST Workshop on AES Modes of Operation, Santa Barbara, CA (August 24, 2001)
-
2nd NIST Workshop on AES Modes of Operation, Santa Barbara, CA (August 24, 2001)
-
-
Gligor, V.1
Donescu, P.2
-
10
-
-
84958968987
-
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
-
Matsui, M. (ed.) FSE 2001. Springer, Heidelberg
-
Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 1-20. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2355
, pp. 1-20
-
-
Gligor, V.D.1
Donescu, P.2
-
12
-
-
84974712857
-
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., Cho, I.: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 273-283. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 273-283
-
-
Hong, S.1
Lee, S.2
Lim, J.3
Sung, J.4
Cheon, D.5
Cho, I.6
-
13
-
-
38149136524
-
On Efficient Message Authentication Via Block Cipher Design Techniques
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Jakimoski, G., Subbalakshmi, K.P.: On Efficient Message Authentication Via Block Cipher Design Techniques. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 232-248. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 232-248
-
-
Jakimoski, G.1
Subbalakshmi, K.P.2
-
14
-
-
84945137421
-
Encryption Modes with Almost Free Message Integrity
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529-544. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 529-544
-
-
Jutla, C.S.1
-
15
-
-
0035667545
-
Practical and Provable Security Against Differential and Linear Cryptanalysis for Ssubstitution-Permutation Networks
-
Kang, J.-S., Hong, S., Lee, S., Yi, O., Park, C., Lim, J.: Practical and Provable Security Against Differential and Linear Cryptanalysis for Ssubstitution-Permutation Networks. ETRI Journal 23(4), 158-167 (2001)
-
(2001)
ETRI Journal
, vol.23
, Issue.4
, pp. 158-167
-
-
Kang, J.-S.1
Hong, S.2
Lee, S.3
Yi, O.4
Park, C.5
Lim, J.6
-
16
-
-
84945126880
-
NewMethod for Upper Bounding the Maximum Average Linear Hull Probability for sPNs
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Keliher, L., Meijer, H., Tavares, S.: NewMethod for Upper Bounding the Maximum Average Linear Hull Probability for sPNs. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 420-436. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 420-436
-
-
Keliher, L.1
Meijer, H.2
Tavares, S.3
-
17
-
-
84949188599
-
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael
-
Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. Springer, Heidelberg
-
Keliher, L., Meijer, H., Tavares, S.: Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 112-128. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2259
, pp. 112-128
-
-
Keliher, L.1
Meijer, H.2
Tavares, S.3
-
19
-
-
84958979414
-
New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis
-
Gollmann, D. (ed.) FSE 1996. Springer, Heidelberg
-
Matsui, M.: New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 205-218. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 205-218
-
-
Matsui, M.1
-
20
-
-
33746720876
-
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
-
Robshaw, M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Minematsu, K., Tsunoo, Y.: Provably Secure MACs from Differentially- Uniform Permutations and AES-Based Implementations. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 226-241. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 226-241
-
-
Minematsu, K.1
Tsunoo, Y.2
-
21
-
-
84958758328
-
On the Security of Rijndael- Like Structures against Differential and Linear Cryptanalysis
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Park, S., Sung, S.H., Chee, S., Yoon, E.-J., Lim, J.: On the Security of Rijndael- Like Structures against Differential and Linear Cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 176-191. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 176-191
-
-
Park, S.1
Sung, S.H.2
Chee, S.3
Yoon, E.-J.4
Lim, J.5
-
22
-
-
0242487613
-
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES
-
Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
-
Park, S., Sung, S.H., Lee, S., Lim, J.: Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 247-260. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 247-260
-
-
Park, S.1
Sung, S.H.2
Lee, S.3
Lim, J.4
-
23
-
-
84957645558
-
Bucket Hashing and Its Application to Fast Message Authentication
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Rogaway, P.: Bucket Hashing and Its Application to Fast Message Authentication. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 29-42. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
24
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: Proc. 8th ACM Conf. Comp. and Comm. Security, CCS (2001)
-
Proc. 8th ACM Conf. Comp. and Comm. Security, CCS (2001)
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
25
-
-
33746684991
-
Resynchronization Attacks on WG and LEX
-
Robshaw, M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Wu, H., Preneel, B.: Resynchronization Attacks on WG and LEX. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 422-432. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 422-432
-
-
Wu, H.1
Preneel, B.2
|