Authenticated encryption

Results: 182



#Item
41AEZ v3: Authenticated Encryption by Enciphering Viet Tung Hoang University of Maryland Georgetown University

AEZ v3: Authenticated Encryption by Enciphering Viet Tung Hoang University of Maryland Georgetown University

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-08-29 19:31:43
    42The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

    The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

    Add to Reading List

    Source URL: www1.spms.ntu.edu.sg

    Language: English - Date: 2015-10-05 00:19:27
      43Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1  Universität Passau

      Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic1 , Atul Luykx2 , and Bart Mennink2 1 Universität Passau

      Add to Reading List

      Source URL: des.cse.nsysu.edu.tw

      Language: English - Date: 2014-12-07 09:37:30
        44Keyak v2 Leakage-robust authenticated encryption Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 Radboud

        Keyak v2 Leakage-robust authenticated encryption Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 Radboud

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          45Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam1 , Kenneth Koon-Ho Wong1 , Harry Bartlett1 , Leonie Simpson1 , Ed Dawson1 , and Josef Pieprzyk1,2 1

          Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam1 , Kenneth Koon-Ho Wong1 , Harry Bartlett1 , Leonie Simpson1 , Ed Dawson1 , and Josef Pieprzyk1,2 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-22 00:02:00
            46CLOC: Authenticated Encryption for Short Input⋆ Tetsu Iwata1 , Kazuhiko Minematsu2 , Jian Guo3 , and Sumio Morioka4 1 Nagoya University, Japan,  NEC Corporation, Japan,

            CLOC: Authenticated Encryption for Short Input⋆ Tetsu Iwata1 , Kazuhiko Minematsu2 , Jian Guo3 , and Sumio Morioka4 1 Nagoya University, Japan, NEC Corporation, Japan,

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2014-03-01 01:27:49
              47A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

              A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-02-17 07:57:12
              48- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

              - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

              Add to Reading List

              Source URL: security-lab.jaist.ac.jp

              Language: English - Date: 2015-11-09 21:16:55
              49Online Authenticated Encryption  Reza Reyhanitabar EPFL Switzerland

              Online Authenticated Encryption Reza Reyhanitabar EPFL Switzerland

              Add to Reading List

              Source URL: www1.spms.ntu.edu.sg

              Language: English - Date: 2015-10-08 00:33:25
                50The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

                The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

                Add to Reading List

                Source URL: web.cecs.pdx.edu

                Language: English - Date: 2009-09-29 10:18:42