Tweakable enciphering schemes using only the encryption function of a block cipher (Q1944173): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ipl.2011.06.014 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1993258060 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q122877547 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of IV Dependent Stream Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941857 / rank
 
Normal rank
Property / cites work
 
Property / cites work: HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: A General Construction of Tweakable Block Ciphers and Different Modes of Operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724429 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Tweaking Luby-Rackoff Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Invertible Universal Hashing and the TET Encryption Mode / rank
 
Normal rank
Property / cites work
 
Property / cites work: MMH: Software message authentication in the Gbit/second rates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409107 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Luby-Rackoff ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of the Extended Codebook (XCB) Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable Enciphering Schemes from Hash-Sum-Expansion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2768333 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the construction of pseudorandom permutations: Luby-Rackoff revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279682 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413868 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast evaluation of polynomials by rational preparation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: A general mixing strategy for the ECB-Mix-ECB mode of operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new multi-linear universal hash family / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology / rank
 
Normal rank

Latest revision as of 08:40, 6 July 2024

scientific article
Language Label Description Also known as
English
Tweakable enciphering schemes using only the encryption function of a block cipher
scientific article

    Statements

    Tweakable enciphering schemes using only the encryption function of a block cipher (English)
    0 references
    0 references
    4 April 2013
    0 references
    0 references
    cryptography
    0 references
    block cipher
    0 references
    disk encryption
    0 references
    mode of operation
    0 references
    stream cipher
    0 references
    tweakable enciphering scheme
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references