Fast Software Encryption

From MaRDI portal
Publication:5713920

DOI10.1007/b98177zbMath1079.68537OpenAlexW2485295499MaRDI QIDQ5713920

Mihir Bellare, David Wagner, Phillip Rogaway

Publication date: 27 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98177




Related Items (23)

Automated proofs of block cipher modes of operationOn modes of operations of a block cipher for authentication and authenticated encryptionPractical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor NetworksRobust Authenticated Encryption and the Limits of Symmetric CryptographyAttacks and Security Proofs of EAX-PrimeIntegrity Analysis of Authenticated Encryption Based on Stream CiphersContext discovery and commitment attacks. How to break CCM, EAX, SIV, and moreLocal XOR unification: definitions, algorithms and application to cryptographyAuthenticated Encryption Mode for Beyond the Birthday Bound SecurityTrick or Tweak: On the (In)security of OTR’s TweaksStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesToward a fully secure authenticated encryption scheme from a pseudorandom permutationRIV for Robust Authenticated EncryptionThe Software Performance of Authenticated-Encryption ModesA Provable-Security Treatment of the Key-Wrap ProblemCryptanalysis of the EPBC Authenticated Encryption ModeCryptanalysis of OCB2: attacks on authenticity and confidentialityNear birthday attack on “$8$ bits” $\mathsf{AEAD}$ modeAuthenticated Encryption with Small Stretch (or, How to Accelerate AERO)Authenticated encryption: relations among notions and analysis of the generic composition paradigmBeyond conventional security in sponge-based authenticated encryption modesCounter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers







This page was built for publication: Fast Software Encryption