Fast Software Encryption
From MaRDI portal
Publication:5713920
DOI10.1007/b98177zbMath1079.68537OpenAlexW2485295499MaRDI QIDQ5713920
Mihir Bellare, David Wagner, Phillip Rogaway
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98177
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Theory of software (68N99)
Related Items (23)
Automated proofs of block cipher modes of operation ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults? ⋮ Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks ⋮ Robust Authenticated Encryption and the Limits of Symmetric Cryptography ⋮ Attacks and Security Proofs of EAX-Prime ⋮ Integrity Analysis of Authenticated Encryption Based on Stream Ciphers ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Local XOR unification: definitions, algorithms and application to cryptography ⋮ Authenticated Encryption Mode for Beyond the Birthday Bound Security ⋮ Trick or Tweak: On the (In)security of OTR’s Tweaks ⋮ Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes ⋮ Toward a fully secure authenticated encryption scheme from a pseudorandom permutation ⋮ RIV for Robust Authenticated Encryption ⋮ The Software Performance of Authenticated-Encryption Modes ⋮ A Provable-Security Treatment of the Key-Wrap Problem ⋮ Cryptanalysis of the EPBC Authenticated Encryption Mode ⋮ Cryptanalysis of OCB2: attacks on authenticity and confidentiality ⋮ Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode ⋮ Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
This page was built for publication: Fast Software Encryption