McOE
From MaRDI portal
Software:32690
No author found.
Related Items (16)
Nonce-misuse security of the SAEF authenticated encryption mode ⋮ On modes of operations of a block cipher for authentication and authenticated encryption ⋮ Optimizing Online Permutation-Based AE Schemes for Lightweight Applications ⋮ Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Authenticated Encryption with Variable Stretch ⋮ A New Algorithm for the Unbalanced Meet-in-the-Middle Problem ⋮ Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data ⋮ Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption ⋮ ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers ⋮ The \texttt{Deoxys} AEAD family ⋮ Revisiting construction of online cipher in hash-ECB-hash structure ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
This page was built for software: McOE