Authenticated encryption

Results: 182



#Item
41

AEZ v3: Authenticated Encryption by Enciphering Viet Tung Hoang University of Maryland Georgetown University

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-08-29 19:31:43
    42

    The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

    Add to Reading List

    Source URL: www1.spms.ntu.edu.sg

    Language: English - Date: 2015-10-05 00:19:27
      43

      Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 Universität Passau

      Add to Reading List

      Source URL: des.cse.nsysu.edu.tw

      Language: English - Date: 2014-12-07 09:37:30
        44

        Keyak v2 Leakage-robust authenticated encryption Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 Radboud

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          45

          Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam1 , Kenneth Koon-Ho Wong1 , Harry Bartlett1 , Leonie Simpson1 , Ed Dawson1 , and Josef Pieprzyk1,2 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-22 00:02:00
            46

            CLOC: Authenticated Encryption for Short Input⋆ Tetsu Iwata1 , Kazuhiko Minematsu2 , Jian Guo3 , and Sumio Morioka4 1 Nagoya University, Japan, NEC Corporation, Japan,

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2014-03-01 01:27:49
              47Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

              A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-02-17 07:57:12
              48Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

              - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

              Add to Reading List

              Source URL: security-lab.jaist.ac.jp

              Language: English - Date: 2015-11-09 21:16:55
              49

              Online Authenticated Encryption Reza Reyhanitabar EPFL Switzerland

              Add to Reading List

              Source URL: www1.spms.ntu.edu.sg

              Language: English - Date: 2015-10-08 00:33:25
                50

                The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

                Add to Reading List

                Source URL: web.cecs.pdx.edu

                Language: English - Date: 2009-09-29 10:18:42
                  UPDATE