Authenticated encryption

Results: 182



#Item
21Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
22Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
23Cryptography / Stream ciphers / Data Encryption Standard / Py / VEST / DEAL / Authenticated encryption / Institute for Applied Information Processing and Communications

Robustness of CAESAR candidates Advisor(s): Maria Eichlseder Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
24Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
25Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
26Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
27Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
28Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Key Wrap / One-key MAC / Block cipher / CCM mode

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:22:52
29Cryptography / Encryption / Ciphertext / Cipher / Plaintext / Science and technology / Science / Mathematics / Multiple encryption / Authenticated encryption

Microsoft PowerPoint - ch5.ppt [相容模式]

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English - Date: 2012-08-25 21:38:28
30Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
UPDATE