Block cipher mode of operation

Results: 110



#Item
1An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
2Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
3D:/Documents/Courses/Winter 2014/aez/rae.dvi

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
4Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
5X-Wall MX Introduction

X-Wall MX Introduction

Add to Reading List

Source URL: www.enovatech.com

Language: English - Date: 2015-08-12 02:55:36
6The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007  Phillip Rogaway

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:22:52
7Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-01-05 12:45:55
8X-Wall MX+_Specification_Rev 2.0_02042016  X-Wall MX+ Specification RevProduct SKU (Stock Keeping Unit):

X-Wall MX+_Specification_Rev 2.0_02042016 X-Wall MX+ Specification RevProduct SKU (Stock Keeping Unit):

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2016-02-04 04:55:41
9Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
10: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2012-11-01 12:03:04