Authenticated encryption

Results: 182



#Item
1Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information  26 avril 2017

Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information 26 avril 2017

Add to Reading List

Source URL: jc2-2017.inria.fr

Language: English - Date: 2017-05-09 09:15:41
    2Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

    Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2013-01-15 23:49:06
      3Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago  Krovetz–Rogaway, tomorrow:

      Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago Krovetz–Rogaway, tomorrow:

      Add to Reading List

      Source URL: fse2011.mat.dtu.dk

      Language: English - Date: 2011-02-14 02:32:24
        4Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

        Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

        Add to Reading List

        Source URL: ccccspeed.win.tue.nl

        Language: English - Date: 2016-10-23 14:53:38
          5Authenticated encryption  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

          Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2017-10-30 14:38:29
            6Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

            Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

            Add to Reading List

            Source URL: 2012.pairing-conference.org

            Language: English - Date: 2016-10-23 14:53:38
              7Permutation-based encryption, authentication and authenticated encryption Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

              Permutation-based encryption, authentication and authenticated encryption Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

              Add to Reading List

              Source URL: keccak.team

              Language: English - Date: 2017-08-22 12:54:45
                8Authenticated encryption  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

                Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

                Add to Reading List

                Source URL: www.cs.bham.ac.uk.

                Language: English - Date: 2017-10-30 14:38:29
                  9ICEPOLE v2: High-speed, Hardware-oriented Authenticated Encryption Scheme Pawel Morawiecki 1 Kris Gaj3 Ekawat Homsirikamol3 Krystian Matusiewicz6 Josef Pieprzyk1,2 Marcin Rogawski5 Marian Srebrny1 Marcin W´ ojcik4

                  ICEPOLE v2: High-speed, Hardware-oriented Authenticated Encryption Scheme Pawel Morawiecki 1 Kris Gaj3 Ekawat Homsirikamol3 Krystian Matusiewicz6 Josef Pieprzyk1,2 Marcin Rogawski5 Marian Srebrny1 Marcin W´ ojcik4

                  Add to Reading List

                  Source URL: www1.spms.ntu.edu.sg

                  Language: English - Date: 2015-10-04 23:56:38
                    10The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

                    The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

                    Add to Reading List

                    Source URL: www1.spms.ntu.edu.sg

                    Language: English - Date: 2015-10-04 23:56:24