Authenticated encryption

Results: 182



#Item
11

AEGIS A Fast Authenticated Encryption Algorithm Hongjun Wu Bart Preneel

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2015-10-04 23:56:22
    12

    Boosting Authenticated Encryption Robustness With Minimal Modifications Tomer Ashur1 , Orr Dunkelman2 , and Atul Luykx1,3 1 3

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2017-05-25 19:04:00
      13

      Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes? Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-09-10 02:45:52
        14

        NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-11-28 08:24:01
          15

          Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Robert Granger1 , Philipp Jovanovic2 , Bart Mennink3 , and Samuel Neves4 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-03-02 13:09:18
            16

            Robust Authenticated Encryption and the Limits of Symmetric Cryptography? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-09-14 09:48:53
              17

              The proceedings version of this paper appears asThis is the full version. Authenticated-Encryption with Associated-Data Phillip Rogaway∗ 20 September 2002

              Add to Reading List

              Source URL: web.cs.ucdavis.edu

              - Date: 2002-09-30 04:19:16
                18

                An earlier version of this paper appears at Fast Software EncryptionFSEThe Software Performance of Authenticated-Encryption Modes Ted Krovetz∗

                Add to Reading List

                Source URL: web.cs.ucdavis.edu

                - Date: 2011-03-21 19:25:18
                  19Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

                  AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

                  Add to Reading List

                  Source URL: web.cs.ucdavis.edu

                  Language: English - Date: 2015-02-21 21:04:37
                  20Cryptography / Authenticated encryption / Symmetric-key cryptography / Block cipher / Random oracle / RSA / Advantage / Encryption / Public-key cryptography

                  PPAE: Practical Parazoa Authenticated Encryption Family PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

                  Add to Reading List

                  Source URL: security-lab.jaist.ac.jp

                  Language: English - Date: 2015-11-25 00:46:55
                  UPDATE