Authenticated encryption

Results: 182



#Item
1

Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information 26 avril 2017

Add to Reading List

Source URL: jc2-2017.inria.fr

Language: English - Date: 2017-05-09 09:15:41
    2

    Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2013-01-15 23:49:06
      3

      Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago Krovetz–Rogaway, tomorrow:

      Add to Reading List

      Source URL: fse2011.mat.dtu.dk

      Language: English - Date: 2011-02-14 02:32:24
        4

        Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

        Add to Reading List

        Source URL: ccccspeed.win.tue.nl

        Language: English - Date: 2016-10-23 14:53:38
          5

          Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2017-10-30 14:38:29
            6

            Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

            Add to Reading List

            Source URL: 2012.pairing-conference.org

            Language: English - Date: 2016-10-23 14:53:38
              7

              Permutation-based encryption, authentication and authenticated encryption Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

              Add to Reading List

              Source URL: keccak.team

              Language: English - Date: 2017-08-22 12:54:45
                8

                Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

                Add to Reading List

                Source URL: www.cs.bham.ac.uk.

                Language: English - Date: 2017-10-30 14:38:29
                  9

                  ICEPOLE v2: High-speed, Hardware-oriented Authenticated Encryption Scheme Pawel Morawiecki 1 Kris Gaj3 Ekawat Homsirikamol3 Krystian Matusiewicz6 Josef Pieprzyk1,2 Marcin Rogawski5 Marian Srebrny1 Marcin W´ ojcik4

                  Add to Reading List

                  Source URL: www1.spms.ntu.edu.sg

                  Language: English - Date: 2015-10-04 23:56:38
                    10

                    The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

                    Add to Reading List

                    Source URL: www1.spms.ntu.edu.sg

                    Language: English - Date: 2015-10-04 23:56:24
                      UPDATE