메뉴 건너뛰기




Volumn 8544 LNCS, Issue , 2014, Pages 306-321

ELmE: A misuse resistant parallel authenticated encryption

Author keywords

Authenticated Encryption; EME; Misuse Resistant; Privacy

Indexed keywords

AUTHENTICATION; DATA PRIVACY; DATA PROCESSING; MIXING; SECURITY OF DATA;

EID: 84904152379     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-08344-5_20     Document Type: Conference Paper
Times cited : (19)

References (36)
  • 2
    • 84949141957 scopus 로고    scopus 로고
    • Specification of the 3gpp confidentiality and integrity algorithms 128-eea3 and 128-eia3
    • (no editor), Citations in this document: £1.1
    • (no editor), Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 and 128-EIA3. Document 2: ZUC Specification. ETSI/SAGE Specification, Version: 1.5 (2011), Citations in this document: £1.1
    • (2011) Document 2: ZUC Specification. ETSI/SAGE Specification, Version: 1.5
  • 3
    • 84892395023 scopus 로고    scopus 로고
    • Parallelizable and authenticated online ciphers
    • Sako, K., Sarkar, P. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 424-443. Springer, Heidelberg (2013), Citations in this document: £1.1
    • (2013) Asiacrypt 2013, Part i , vol.8269 , pp. 424-443
    • Andreeva, E.1    Bogdanov, A.2    Luykx, A.3    Mennink, B.4    Tischhauser, E.5    Yasuda, K.6
  • 4
    • 35048826242 scopus 로고    scopus 로고
    • The EAX mode of operation
    • Roy, B., Meier, W. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Bellare, M., Rogaway, P., Wagner, D.: The EAX Mode of Operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389-407. Springer, Heidelberg (2004), Citations in this document: £1.1
    • (2004) FSE 2004 , vol.3017 , pp. 389-407
    • Bellare, M.1    Rogaway, P.2    Wagner, D.3
  • 6
    • 84857722910 scopus 로고    scopus 로고
    • Duplexing the sponge: Single pass authenticated encryption and other applications
    • Miri, A., Vaudenay, S. (eds.) LNCS, Springer, Heidelberg Citations in this document: £1.1, £4
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the Sponge: Single Pass Authenticated Encryption and Other Applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320-337. Springer, Heidelberg (2012), Citations in this document: £1.1, £4
    • (2012) SAC 2011 , vol.7118 , pp. 320-337
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 7
    • 84904191320 scopus 로고    scopus 로고
    • Misuse resistant parallel authenticated encryptions
    • Citations in this document: £4.1, £4.2, £5.1
    • Datta, N., Nandi, M.: Misuse Resistant Parallel Authenticated Encryptions, IACR Cryptology ePrint Archive (2013), http://eprint.iacr.org/2013/ 767.pdf, Citations in this document: £4.1, £4.2, £5.1
    • (2013) IACR Cryptology EPrint Archive
    • Datta, N.1    Nandi, M.2
  • 8
    • 84958968987 scopus 로고    scopus 로고
    • Fast encryption and authentication: Xcbc encryption and xecb authentication modes
    • Matsui, M. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92-108. Springer, Heidelberg (2002), Citations in this document: £1.1
    • (2002) FSE 2001 , vol.2355 , pp. 92-108
    • Gligor, V.D.1    Donescu, P.2
  • 9
    • 84866642137 scopus 로고    scopus 로고
    • Recommendation for block cipher modes of operation: Three variants of ciphertext stealing for CBC mode
    • Citations in this document: £3
    • Dworkin, M.: Recommendation for block cipher modes of operation: three variants of ciphertext stealing for CBC mode. Addendum to NIST Special Publication 80038A (2010), Citations in this document: £3
    • (2010) Addendum to NIST Special Publication 80038A
    • Dworkin, M.1
  • 10
    • 33744898820 scopus 로고    scopus 로고
    • HCTR: A variable-input-length enciphering mode
    • Feng, D., Lin, D., Yung, M. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £3
    • Wang, P., Feng, D., Wu, W.: HCTR: A Variable-Input-Length Enciphering Mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 175-188. Springer, Heidelberg (2005), Citations in this document: £3
    • (2005) CISC 2005 , vol.3822 , pp. 175-188
    • Wang, P.1    Feng, D.2    Wu, W.3
  • 11
    • 84866650081 scopus 로고    scopus 로고
    • McOE: A family of almost foolproof on- line authenticated encryption schemes
    • Canteaut, A. (ed.) LNCS, Springer, Heidelberg Citations in this document: £1.1, £1.3
    • Fleischmann, E., Forler, C., Lucks, S.: McOE: A Family of Almost Foolproof On- Line Authenticated Encryption Schemes. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 196-215. Springer, Heidelberg (2012), Citations in this document: £1.1, £1.3
    • (2012) FSE 2012 , vol.7549 , pp. 196-215
    • Fleischmann, E.1    Forler, C.2    Lucks, S.3
  • 12
    • 35048826668 scopus 로고    scopus 로고
    • Authenticated on-line encryption
    • Matsui, M., Zuccherato, R.J. (eds.) LNCS, Springer, Heidelberg
    • Fouque, P.-A., Joux, A., Martinet, G., Valette, F.: Authenticated On-Line Encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145-159. Springer, Heidelberg (2004)
    • (2004) SAC 2003 , vol.3006 , pp. 145-159
    • Fouque, P.-A.1    Joux, A.2    Martinet, G.3    Valette, F.4
  • 13
    • 35248863065 scopus 로고    scopus 로고
    • A tweakable enciphering mode
    • Boneh, D. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.2
    • Halevi, S., Rogaway, P.: A Tweakable Enciphering Mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482-499. Springer, Heidelberg (2003), Citations in this document: £1.2
    • (2003) Crypto 2003 , vol.2729 , pp. 482-499
    • Halevi, S.1    Rogaway, P.2
  • 14
    • 35048894821 scopus 로고    scopus 로고
    • A parallelizable enciphering mode
    • Okamoto, T. (ed.) LNCS, Springer, Heidelberg Citations in this document: £1.1, £1.2
    • Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 292-304. Springer, Heidelberg (2004), Citations in this document: £1.1, £1.2
    • (2004) CT-RSA 2004 , vol.2964 , pp. 292-304
    • Halevi, S.1    Rogaway, P.2
  • 17
    • 33746682499 scopus 로고    scopus 로고
    • New blockcipher modes of operation with beyond the birthday bound security
    • Robshaw, M. (ed.) LNCS, Springer, Heidelberg Citations in this document: £1.1
    • Iwata, T.: New blockcipher modes of operation with beyond the birthday bound security. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 310-327. Springer, Heidelberg (2006), Citations in this document: £1.1
    • (2006) FSE 2006 , vol.4047 , pp. 310-327
    • Iwata, T.1
  • 18
    • 70350417930 scopus 로고    scopus 로고
    • HBS: A single-key mode of operation for deterministic authenticated encryption
    • Dunkelman, O. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Iwata, T., Yasuda, K.: HBS: A Single-Key mode of Operation for Deterministic Authenticated Encryption. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 394-415. Springer, Heidelberg (2009), Citations in this document: £1.1
    • (2009) FSE 2009 , vol.5665 , pp. 394-415
    • Iwata, T.1    Yasuda, K.2
  • 19
    • 70549095310 scopus 로고    scopus 로고
    • A single-key, inverse-cipher-free mode for deterministic authenticated encryption
    • Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Iwata, T., Yasuda, K.: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 313-330. Springer, Heidelberg (2009), Citations in this document: £1.1
    • (2009) SAC 2009 , vol.5867 , pp. 313-330
    • Iwata, T.1    Yasuda, K.2
  • 20
    • 38149093714 scopus 로고    scopus 로고
    • Blockwise-adaptive attackers: Revisiting the (in)security of some provably secure encryption models: CBC, GEM, IACBC
    • Yung, M. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.3
    • Joux, A., Martinet, G., Valette, F.: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17-30. Springer, Heidelberg (2002), Citations in this document: £1.3
    • (2002) Crypto 2002 , vol.2442 , pp. 17-30
    • Joux, A.1    Martinet, G.2    Valette, F.3
  • 21
    • 84945137421 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • Pfitzmann, B. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1, £1.1
    • Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529-544. Springer, Heidelberg (2001), Citations in this document: £1.1, £1.1
    • (2001) Eurocrypt 2001 , vol.2045 , pp. 529-544
    • Jutla, C.S.1
  • 22
    • 79960002636 scopus 로고    scopus 로고
    • The software performance of authenticated-encryption modes
    • Joux, A. (ed.) LNCS, Springer, Heidelberg
    • Krovetz, T., Rogaway, P.: The Software Performance of Authenticated-Encryption Modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 306-327. Springer, Heidelberg (2011)
    • (2011) FSE 2011 , vol.6733 , pp. 306-327
    • Krovetz, T.1    Rogaway, P.2
  • 23
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Citations in this document: £1.2, £1.3
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing, 373-386 (1988), Citations in this document: £1.2, £1.3
    • (1988) SIAM Journal of Computing , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 24
    • 26444468160 scopus 로고    scopus 로고
    • Two pass authenticated encryption faster than generic composition
    • Gilbert, H., Handschuh, H. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Lucks, S.: Two Pass Authenticated Encryption Faster than Generic Composition. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 284-298. Springer, Heidelberg (2005), Citations in this document: £1.1
    • (2005) FSE 2005 , vol.3557 , pp. 284-298
    • Lucks, S.1
  • 25
    • 58549112460 scopus 로고    scopus 로고
    • Two new efficient CCA-secure online ciphers: MHCBC and MCBC
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.3
    • Nandi, M.: Two new efficient CCA-secure online ciphers: MHCBC and MCBC. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 350-362. Springer, Heidelberg (2008), Citations in this document: £1.3
    • (2008) Indocrypt 2008 , vol.5365 , pp. 350-362
    • Nandi, M.1
  • 26
    • 84916617883 scopus 로고    scopus 로고
    • A generic method to extend message space of a strong pseudorandom permutation
    • Nandi, M.: A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation. Computacin y Sistemas 12 (2009)
    • (2009) Computacin y Sistemas , pp. 12
    • Nandi, M.1
  • 27
    • 70350677135 scopus 로고    scopus 로고
    • The "coefficients h" technique
    • Avanzi, R.M., Keliher, L., Sica, F. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £2.1
    • Patarin, J.: The "Coefficients H" technique. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 328-345. Springer, Heidelberg (2009), Citations in this document: £2.1
    • (2009) SAC 2008 , vol.5381 , pp. 328-345
    • Patarin, J.1
  • 29
    • 35348931588 scopus 로고    scopus 로고
    • How to enrich the message space of a cipher
    • Biryukov, A. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £3
    • Ristenpart, T., Rogaway, P.: How to Enrich the Message Space of a Cipher. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 101-118. Springer, Heidelberg (2007), Citations in this document: £3
    • (2007) FSE 2007 , vol.4593 , pp. 101-118
    • Ristenpart, T.1    Rogaway, P.2
  • 30
    • 33644958567 scopus 로고    scopus 로고
    • Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
    • Lee, P.J. (ed.) LNCS, Springer, Heidelberg
    • Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16-31. Springer, Heidelberg (2004)
    • (2004) Asiacrypt 2004 , vol.3329 , pp. 16-31
    • Rogaway, P.1
  • 31
    • 35048855085 scopus 로고    scopus 로고
    • Nonce-based symmetric encryption
    • Roy, B., Meier, W. (eds.) LNCS, Springer, Heidelberg, Citations in this document: £1.3
    • Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348-359. Springer, Heidelberg (2004), Citations in this document: £1.3
    • (2004) FSE 2004 , vol.3017 , pp. 348-359
    • Rogaway, P.1
  • 32
    • 79951784877 scopus 로고    scopus 로고
    • Online ciphers from tweakable blockciphers
    • Citations in this document: £1.3
    • Rogaway, P., Zhang, H.: Online Ciphers from Tweakable Blockciphers. In: CT-RSA, pp. 237-249 (2011), Citations in this document: £1.3
    • (2011) CT-RSA , pp. 237-249
    • Rogaway, P.1    Zhang, H.2
  • 33
    • 33746068613 scopus 로고    scopus 로고
    • A provable-security treatment of the key-wrap problem
    • Vaudenay, S. (ed.) LNCS, Springer, Heidelberg, Citations in this document: £1.1
    • Rogaway, P., Shrimpton, T.: A Provable-Security Treatment of the Key-Wrap Problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006), Citations in this document: £1.1
    • (2006) Eurocrypt 2006 , vol.4004 , pp. 373-390
    • Rogaway, P.1    Shrimpton, T.2
  • 34
    • 84871872161 scopus 로고    scopus 로고
    • On authenticated encryption using stream ciphers supporting an initialisation vector
    • capsulating Security Payload (ESP), Citations in this document: £1.1
    • Sarkar, P.: On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector. IACR Cryptology ePrint Archive, 299-299 (2011), http://eprint.iacr.org/2011/299.pdf; capsulating Security Payload (ESP), Citations in this document: £1.1
    • (2011) IACR Cryptology EPrint Archive , pp. 299-299
    • Sarkar, P.1
  • 35
    • 84904155122 scopus 로고    scopus 로고
    • The use of galois/counter mode (gcm)
    • Citations in this document: £1.1, £1.3
    • Viega, J., McGraw, D.: The use of Galois/Counter Mode (GCM) in IPsec En, RFC 4106 (2005), Citations in this document: £1.1, £1.3
    • (2005) IPsec En, RFC 4106
    • Viega, J.1    McGraw, D.2
  • 36
    • 21144435120 scopus 로고    scopus 로고
    • Decorrelation: A theory for block cipher security
    • Vaudenay, S.: Decorrelation: A Theory for Block Cipher Security. Journal of Cryptology, 249-286 (2003)
    • (2003) Journal of Cryptology , pp. 249-286
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.