-
1
-
-
84890723727
-
-
(no editor), Citations in this document: £1.1, £1.1
-
(no editor), CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness, http://competitions.cr.yp.to/caesar.html, Citations in this document: £1.1, £1.1
-
CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness
-
-
-
2
-
-
84949141957
-
Specification of the 3gpp confidentiality and integrity algorithms 128-eea3 and 128-eia3
-
(no editor), Citations in this document: £1.1
-
(no editor), Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 and 128-EIA3. Document 2: ZUC Specification. ETSI/SAGE Specification, Version: 1.5 (2011), Citations in this document: £1.1
-
(2011)
Document 2: ZUC Specification. ETSI/SAGE Specification, Version: 1.5
-
-
-
3
-
-
84892395023
-
Parallelizable and authenticated online ciphers
-
Sako, K., Sarkar, P. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 424-443. Springer, Heidelberg (2013), Citations in this document: £1.1
-
(2013)
Asiacrypt 2013, Part i
, vol.8269
, pp. 424-443
-
-
Andreeva, E.1
Bogdanov, A.2
Luykx, A.3
Mennink, B.4
Tischhauser, E.5
Yasuda, K.6
-
4
-
-
35048826242
-
The EAX mode of operation
-
Roy, B., Meier, W. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Bellare, M., Rogaway, P., Wagner, D.: The EAX Mode of Operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389-407. Springer, Heidelberg (2004), Citations in this document: £1.1
-
(2004)
FSE 2004
, vol.3017
, pp. 389-407
-
-
Bellare, M.1
Rogaway, P.2
Wagner, D.3
-
5
-
-
84904210626
-
-
Citations in this document: £1.3
-
Bellare, M., Blake, J., Rogaway, P.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption 6, 365-403 (2005), Citations in this document: £1.3
-
(2005)
OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption
, vol.6
, pp. 365-403
-
-
Bellare, M.1
Blake, J.2
Rogaway, P.3
-
6
-
-
84857722910
-
Duplexing the sponge: Single pass authenticated encryption and other applications
-
Miri, A., Vaudenay, S. (eds.) LNCS, Springer, Heidelberg Citations in this document: £1.1, £4
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the Sponge: Single Pass Authenticated Encryption and Other Applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320-337. Springer, Heidelberg (2012), Citations in this document: £1.1, £4
-
(2012)
SAC 2011
, vol.7118
, pp. 320-337
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
7
-
-
84904191320
-
Misuse resistant parallel authenticated encryptions
-
Citations in this document: £4.1, £4.2, £5.1
-
Datta, N., Nandi, M.: Misuse Resistant Parallel Authenticated Encryptions, IACR Cryptology ePrint Archive (2013), http://eprint.iacr.org/2013/ 767.pdf, Citations in this document: £4.1, £4.2, £5.1
-
(2013)
IACR Cryptology EPrint Archive
-
-
Datta, N.1
Nandi, M.2
-
8
-
-
84958968987
-
Fast encryption and authentication: Xcbc encryption and xecb authentication modes
-
Matsui, M. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92-108. Springer, Heidelberg (2002), Citations in this document: £1.1
-
(2002)
FSE 2001
, vol.2355
, pp. 92-108
-
-
Gligor, V.D.1
Donescu, P.2
-
9
-
-
84866642137
-
Recommendation for block cipher modes of operation: Three variants of ciphertext stealing for CBC mode
-
Citations in this document: £3
-
Dworkin, M.: Recommendation for block cipher modes of operation: three variants of ciphertext stealing for CBC mode. Addendum to NIST Special Publication 80038A (2010), Citations in this document: £3
-
(2010)
Addendum to NIST Special Publication 80038A
-
-
Dworkin, M.1
-
10
-
-
33744898820
-
HCTR: A variable-input-length enciphering mode
-
Feng, D., Lin, D., Yung, M. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £3
-
Wang, P., Feng, D., Wu, W.: HCTR: A Variable-Input-Length Enciphering Mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 175-188. Springer, Heidelberg (2005), Citations in this document: £3
-
(2005)
CISC 2005
, vol.3822
, pp. 175-188
-
-
Wang, P.1
Feng, D.2
Wu, W.3
-
11
-
-
84866650081
-
McOE: A family of almost foolproof on- line authenticated encryption schemes
-
Canteaut, A. (ed.) LNCS, Springer, Heidelberg Citations in this document: £1.1, £1.3
-
Fleischmann, E., Forler, C., Lucks, S.: McOE: A Family of Almost Foolproof On- Line Authenticated Encryption Schemes. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 196-215. Springer, Heidelberg (2012), Citations in this document: £1.1, £1.3
-
(2012)
FSE 2012
, vol.7549
, pp. 196-215
-
-
Fleischmann, E.1
Forler, C.2
Lucks, S.3
-
12
-
-
35048826668
-
Authenticated on-line encryption
-
Matsui, M., Zuccherato, R.J. (eds.) LNCS, Springer, Heidelberg
-
Fouque, P.-A., Joux, A., Martinet, G., Valette, F.: Authenticated On-Line Encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145-159. Springer, Heidelberg (2004)
-
(2004)
SAC 2003
, vol.3006
, pp. 145-159
-
-
Fouque, P.-A.1
Joux, A.2
Martinet, G.3
Valette, F.4
-
13
-
-
35248863065
-
A tweakable enciphering mode
-
Boneh, D. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.2
-
Halevi, S., Rogaway, P.: A Tweakable Enciphering Mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482-499. Springer, Heidelberg (2003), Citations in this document: £1.2
-
(2003)
Crypto 2003
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
14
-
-
35048894821
-
A parallelizable enciphering mode
-
Okamoto, T. (ed.) LNCS, Springer, Heidelberg Citations in this document: £1.1, £1.2
-
Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 292-304. Springer, Heidelberg (2004), Citations in this document: £1.1, £1.2
-
(2004)
CT-RSA 2004
, vol.2964
, pp. 292-304
-
-
Halevi, S.1
Rogaway, P.2
-
15
-
-
38349004274
-
A stream cipher proposal: Grain-128, eSTREAM
-
Citations in this document: £1.1
-
Hell, M., Johansson, T., Maximov, A., Meier, W.: A Stream Cipher Proposal: Grain-128, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/071 (2005), http://www.ecrypt.eu.org/stream, Citations in this document: £1.1
-
(2005)
ECRYPT Stream Cipher Project, Report 2006/071
-
-
Hell, M.1
Johansson, T.2
Maximov, A.3
Meier, W.4
-
16
-
-
0038628696
-
-
(Informational), Citations in this document: £1.1
-
Housley, R.,Whiting, D., Ferguson, N.: Counter with CBC-MAC, CCM, RFC 3610 (Informational) (2003), Citations in this document: £1.1
-
(2003)
Counter with CBC-MAC, CCM, RFC 3610
-
-
Housley, R.1
Whiting, D.2
Ferguson, N.3
-
17
-
-
33746682499
-
New blockcipher modes of operation with beyond the birthday bound security
-
Robshaw, M. (ed.) LNCS, Springer, Heidelberg Citations in this document: £1.1
-
Iwata, T.: New blockcipher modes of operation with beyond the birthday bound security. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 310-327. Springer, Heidelberg (2006), Citations in this document: £1.1
-
(2006)
FSE 2006
, vol.4047
, pp. 310-327
-
-
Iwata, T.1
-
18
-
-
70350417930
-
HBS: A single-key mode of operation for deterministic authenticated encryption
-
Dunkelman, O. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Iwata, T., Yasuda, K.: HBS: A Single-Key mode of Operation for Deterministic Authenticated Encryption. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 394-415. Springer, Heidelberg (2009), Citations in this document: £1.1
-
(2009)
FSE 2009
, vol.5665
, pp. 394-415
-
-
Iwata, T.1
Yasuda, K.2
-
19
-
-
70549095310
-
A single-key, inverse-cipher-free mode for deterministic authenticated encryption
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Iwata, T., Yasuda, K.: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 313-330. Springer, Heidelberg (2009), Citations in this document: £1.1
-
(2009)
SAC 2009
, vol.5867
, pp. 313-330
-
-
Iwata, T.1
Yasuda, K.2
-
20
-
-
38149093714
-
Blockwise-adaptive attackers: Revisiting the (in)security of some provably secure encryption models: CBC, GEM, IACBC
-
Yung, M. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.3
-
Joux, A., Martinet, G., Valette, F.: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17-30. Springer, Heidelberg (2002), Citations in this document: £1.3
-
(2002)
Crypto 2002
, vol.2442
, pp. 17-30
-
-
Joux, A.1
Martinet, G.2
Valette, F.3
-
21
-
-
84945137421
-
Encryption modes with almost free message integrity
-
Pfitzmann, B. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1, £1.1
-
Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529-544. Springer, Heidelberg (2001), Citations in this document: £1.1, £1.1
-
(2001)
Eurocrypt 2001
, vol.2045
, pp. 529-544
-
-
Jutla, C.S.1
-
22
-
-
79960002636
-
The software performance of authenticated-encryption modes
-
Joux, A. (ed.) LNCS, Springer, Heidelberg
-
Krovetz, T., Rogaway, P.: The Software Performance of Authenticated-Encryption Modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 306-327. Springer, Heidelberg (2011)
-
(2011)
FSE 2011
, vol.6733
, pp. 306-327
-
-
Krovetz, T.1
Rogaway, P.2
-
23
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Citations in this document: £1.2, £1.3
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing, 373-386 (1988), Citations in this document: £1.2, £1.3
-
(1988)
SIAM Journal of Computing
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
24
-
-
26444468160
-
Two pass authenticated encryption faster than generic composition
-
Gilbert, H., Handschuh, H. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Lucks, S.: Two Pass Authenticated Encryption Faster than Generic Composition. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 284-298. Springer, Heidelberg (2005), Citations in this document: £1.1
-
(2005)
FSE 2005
, vol.3557
, pp. 284-298
-
-
Lucks, S.1
-
25
-
-
58549112460
-
Two new efficient CCA-secure online ciphers: MHCBC and MCBC
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.3
-
Nandi, M.: Two new efficient CCA-secure online ciphers: MHCBC and MCBC. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 350-362. Springer, Heidelberg (2008), Citations in this document: £1.3
-
(2008)
Indocrypt 2008
, vol.5365
, pp. 350-362
-
-
Nandi, M.1
-
26
-
-
84916617883
-
A generic method to extend message space of a strong pseudorandom permutation
-
Nandi, M.: A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation. Computacin y Sistemas 12 (2009)
-
(2009)
Computacin y Sistemas
, pp. 12
-
-
Nandi, M.1
-
27
-
-
70350677135
-
The "coefficients h" technique
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £2.1
-
Patarin, J.: The "Coefficients H" technique. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 328-345. Springer, Heidelberg (2009), Citations in this document: £2.1
-
(2009)
SAC 2008
, vol.5381
, pp. 328-345
-
-
Patarin, J.1
-
29
-
-
35348931588
-
How to enrich the message space of a cipher
-
Biryukov, A. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £3
-
Ristenpart, T., Rogaway, P.: How to Enrich the Message Space of a Cipher. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 101-118. Springer, Heidelberg (2007), Citations in this document: £3
-
(2007)
FSE 2007
, vol.4593
, pp. 101-118
-
-
Ristenpart, T.1
Rogaway, P.2
-
30
-
-
33644958567
-
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
-
Lee, P.J. (ed.) LNCS, Springer, Heidelberg
-
Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16-31. Springer, Heidelberg (2004)
-
(2004)
Asiacrypt 2004
, vol.3329
, pp. 16-31
-
-
Rogaway, P.1
-
31
-
-
35048855085
-
Nonce-based symmetric encryption
-
Roy, B., Meier, W. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.3
-
Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004), Citations in this document: £1.3
-
(2004)
FSE 2004
, vol.3017
, pp. 348-359
-
-
Rogaway, P.1
-
32
-
-
79951784877
-
Online ciphers from tweakable blockciphers
-
Citations in this document: £1.3
-
Rogaway, P., Zhang, H.: Online Ciphers from Tweakable Blockciphers. In: CT-RSA, pp. 237-249 (2011), Citations in this document: £1.3
-
(2011)
CT-RSA
, pp. 237-249
-
-
Rogaway, P.1
Zhang, H.2
-
33
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
Vaudenay, S. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
-
Rogaway, P., Shrimpton, T.: A Provable-Security Treatment of the Key-Wrap Problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006), Citations in this document: £1.1
-
(2006)
Eurocrypt 2006
, vol.4004
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
-
34
-
-
84871872161
-
On authenticated encryption using stream ciphers supporting an initialisation vector
-
capsulating Security Payload (ESP), Citations in this document: £1.1
-
Sarkar, P.: On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector. IACR Cryptology ePrint Archive, 299-299 (2011), http://eprint.iacr.org/2011/299.pdf; capsulating Security Payload (ESP), Citations in this document: £1.1
-
(2011)
IACR Cryptology EPrint Archive
, pp. 299-299
-
-
Sarkar, P.1
-
35
-
-
84904155122
-
The use of galois/counter mode (gcm)
-
Citations in this document: £1.1, £1.3
-
Viega, J., McGraw, D.: The use of Galois/Counter Mode (GCM) in IPsec En, RFC 4106 (2005), Citations in this document: £1.1, £1.3
-
(2005)
IPsec En, RFC 4106
-
-
Viega, J.1
McGraw, D.2
-
36
-
-
21144435120
-
Decorrelation: A theory for block cipher security
-
Vaudenay, S.: Decorrelation: A Theory for Block Cipher Security. Journal of Cryptology, 249-286 (2003)
-
(2003)
Journal of Cryptology
, pp. 249-286
-
-
Vaudenay, S.1
|