Authenticated encryption

Results: 182



#Item
161Block ciphers / Stream ciphers / IAPM / Block cipher / Authenticated encryption / UMAC / CBC-MAC / Pseudorandom number generator / Index of cryptography articles / Cryptography / Message authentication codes / Block cipher modes of operation

Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-24 19:35:04
162Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
163Block cipher / ICE / Stream cipher / Advantage / Cryptography / Keccak / NIST hash function competition

Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaƫl Peeters2 , and Gilles Van Assche1

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
164Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
165Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
166CCM mode / Authenticated encryption / Block cipher / CBC-MAC / Padding / EAX mode / Galois/Counter Mode / Cryptography / Block cipher modes of operation / Message authentication codes

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 13:48:00
167Block cipher / Message authentication codes / Mercy / Initialization vector / Authenticated encryption / Cipher / CBC-MAC / Feistel cipher / Advantage / Cryptography / Block cipher modes of operation / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2003-07-07 17:57:00
168Message authentication codes / Authenticated encryption / Block cipher / CBC-MAC / Advantage / Cipher / Finite fields / Index of cryptography articles / CMAC / Cryptography / Block cipher modes of operation / EAX mode

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:14:24
169Block cipher / Authenticated encryption / Stream cipher / Cipher / Index of cryptography articles / AEAD block cipher modes of operation / Block cipher modes of operation / Cryptography / EAX mode

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:53:47
170Public-key cryptography / Encryption / Symmetric-key algorithm / Semantic security / Information-theoretic security / Chosen-plaintext attack / ElGamal encryption / Data Encryption Standard / DES-X / Cryptography / Cipher / Authenticated encryption

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-05-11 20:53:55
UPDATE