Back to Results
First PageMeta Content
Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector


Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1
Add to Reading List

Document Date: 2004-06-21 18:50:20


Open Document

File Size: 596,19 KB

Share Result on Facebook