Authenticated encryption

Results: 182



#Item
31Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1  Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
32Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
33On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-12-10 09:12:20
34Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
35Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-10 11:24:57
36MACs and Authenticated Encryption February 7, 2013 Introduction Information Security consists of: – Confidentiality (achieved through encryption, aims to prevent adversary from reading a

MACs and Authenticated Encryption February 7, 2013 Introduction Information Security consists of: – Confidentiality (achieved through encryption, aims to prevent adversary from reading a

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:57
    37CBEAM: Ecient Authenticated Encryption from Feebly One-Way Author:  φ

    CBEAM: Ecient Authenticated Encryption from Feebly One-Way Author: φ

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2014-02-27 17:44:36
      38NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

      NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2015-03-16 05:30:12
        39AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara   Ted Krovetz

        AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2015-10-15 15:27:48
        40Robust Authenticated-Encryption AEZ and the Problem that it Solves Viet Tung Hoang1,2 1 3

        Robust Authenticated-Encryption AEZ and the Problem that it Solves Viet Tung Hoang1,2 1 3

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2014-10-04 03:40:56