Attacks and Security Proofs of EAX-Prime
From MaRDI portal
Publication:2946885
DOI10.1007/978-3-662-43933-3_17zbMath1321.94110OpenAlexW1429760160MaRDI QIDQ2946885
Hiraku Morita, Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_17
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers.
- A Provable-Security Treatment of the Key-Wrap Problem
- Revisiting Higher-Order DPA Attacks:
- Power Analysis Attacks
- Progress in Cryptology - INDOCRYPT 2003
- Fast Software Encryption
- Fast Software Encryption
- Topics in Cryptology – CT-RSA 2006
- Applied Cryptography and Network Security
- Fast Software Encryption
This page was built for publication: Attacks and Security Proofs of EAX-Prime