Authenticated encryption

Results: 182



#Item
91Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
92Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
93Authenticated encryption / Chosen-plaintext attack / Block cipher modes of operation / Advantage / Chosen-ciphertext attack / Ciphertext / Block cipher / Data Encryption Standard / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006 Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-17 21:22:01
94Key Wrap / Galois/Counter Mode / Block cipher / CCM mode / Triple DES / Crypt / Cryptography / Block cipher modes of operation / Keccak

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
95Authenticated encryption / Chosen-ciphertext attack / RSA / Semantic security / Advantage / Crypt / Cryptography / Deterministic encryption / Ciphertext

DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-02 21:51:23
96One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:44
97Data / Internet privacy / Internet / Computer network security / TCP/IP / Opportunistic encryption / Tcpcrypt / Authenticated encryption / Password / Cryptographic protocols / Cryptography / Computing

“Opportunistic” Encryption Strengthening the Internet Against Pervasive Monitoring (STRINT) !1

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

Language: English - Date: 2014-03-01 03:17:05
98Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
99NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
100Transport Layer Security / Chosen-plaintext attack / HTTP Secure / Ciphertext / Block cipher modes of operation / Authenticated encryption / Password / Probabilistic encryption / Known-plaintext attack / Cryptography / Security / Initialization vector

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
UPDATE